{"url":"http://public2.vulnerablecode.io/api/packages/1037642?format=json","purl":"pkg:deb/debian/dbus@1.10.32-0%2Bdeb9u1","type":"deb","namespace":"debian","name":"dbus","version":"1.10.32-0+deb9u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.12.28-0+deb11u1","latest_non_vulnerable_version":"1.12.28-0+deb11u1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60693?format=json","vulnerability_id":"VCID-2j9s-7y5m-u3d7","summary":"A local Denial of Service vulnerability was discovered in D-Bus.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12049.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12049","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25969","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26074","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26012","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26064","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849041","reference_id":"1849041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849041"},{"reference_url":"https://security.archlinux.org/ASA-202006-9","reference_id":"ASA-202006-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202006-9"},{"reference_url":"https://security.archlinux.org/AVG-1183","reference_id":"AVG-1183","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1183"},{"reference_url":"https://security.gentoo.org/glsa/202007-46","reference_id":"GLSA-202007-46","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2894","reference_id":"RHSA-2020:2894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3014","reference_id":"RHSA-2020:3014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3044","reference_id":"RHSA-2020:3044","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3298","reference_id":"RHSA-2020:3298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3298"},{"reference_url":"https://usn.ubuntu.com/4398-1/","reference_id":"USN-4398-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4398-1/"},{"reference_url":"https://usn.ubuntu.com/4398-2/","reference_id":"USN-4398-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4398-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052149?format=json","purl":"pkg:deb/debian/dbus@1.12.20-0%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.20-0%252Bdeb10u1"}],"aliases":["CVE-2020-12049"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2j9s-7y5m-u3d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56445?format=json","vulnerability_id":"VCID-agt1-wqw8-mbgf","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42011","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33886","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133617","reference_id":"2133617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133617"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/413","reference_id":"413","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/413"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2022-42011"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agt1-wqw8-mbgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56446?format=json","vulnerability_id":"VCID-fh3r-yj4m-bbhs","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42012","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43242","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44486","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133618","reference_id":"2133618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133618"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/417","reference_id":"417","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/417"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2022-42012"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3r-yj4m-bbhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56444?format=json","vulnerability_id":"VCID-fru7-rpdb-5fft","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42010","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22447","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133616","reference_id":"2133616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133616"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/418","reference_id":"418","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/418"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2022-42010"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fru7-rpdb-5fft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81121?format=json","vulnerability_id":"VCID-m1tk-vryk-pfbu","summary":"dbus: users with the same numeric UID could lead to use-after-free and undefined behaviour","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35512.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35512","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09804","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09755","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1909101","reference_id":"1909101","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1909101"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128","reference_id":"305#note_829128","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128"},{"reference_url":"https://bugs.gentoo.org/755392","reference_id":"755392","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://bugs.gentoo.org/755392"},{"reference_url":"https://security.archlinux.org/AVG-1573","reference_id":"AVG-1573","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1573"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2020-35512","reference_id":"CVE-2020-35512","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2020-35512"},{"reference_url":"https://usn.ubuntu.com/5244-1/","reference_id":"USN-5244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5244-1/"},{"reference_url":"https://usn.ubuntu.com/5244-2/","reference_id":"USN-5244-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5244-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2020-35512"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1tk-vryk-pfbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51468?format=json","vulnerability_id":"VCID-mjps-b9wy-wkgq","summary":"An authentication bypass was discovered in D-Bus.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12749","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0762","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07631","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/108751","reference_id":"108751","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://www.securityfocus.com/bid/108751"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/16","reference_id":"16","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://seclists.org/bugtraq/2019/Jun/16"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719344","reference_id":"1719344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719344"},{"reference_url":"https://www.openwall.com/lists/oss-security/2019/06/11/2","reference_id":"2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://www.openwall.com/lists/oss-security/2019/06/11/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/11/2","reference_id":"2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/06/11/2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375","reference_id":"930375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375"},{"reference_url":"https://security.archlinux.org/ASA-201906-16","reference_id":"ASA-201906-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201906-16"},{"reference_url":"https://security.archlinux.org/AVG-974","reference_id":"AVG-974","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-974"},{"reference_url":"https://www.debian.org/security/2019/dsa-4462","reference_id":"dsa-4462","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://www.debian.org/security/2019/dsa-4462"},{"reference_url":"https://security.gentoo.org/glsa/201909-08","reference_id":"GLSA-201909-08","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://security.gentoo.org/glsa/201909-08"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html","reference_id":"msg00059.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html","reference_id":"msg00092.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1726","reference_id":"RHSA-2019:1726","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2868","reference_id":"RHSA-2019:2868","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2870","reference_id":"RHSA-2019:2870","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3707","reference_id":"RHSA-2019:3707","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4032","reference_id":"RHSA-2020:4032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4015-1/","reference_id":"USN-4015-1","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://usn.ubuntu.com/4015-1/"},{"reference_url":"https://usn.ubuntu.com/4015-2/","reference_id":"USN-4015-2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://usn.ubuntu.com/4015-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/","reference_id":"V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052149?format=json","purl":"pkg:deb/debian/dbus@1.12.20-0%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.20-0%252Bdeb10u1"}],"aliases":["CVE-2019-12749"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjps-b9wy-wkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78359?format=json","vulnerability_id":"VCID-vk1a-p2pv-67gy","summary":"dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34969.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34969","reference_id":"","reference_type":"","scores":[{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71349","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037151","reference_id":"1037151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213166","reference_id":"2213166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213166"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/457","reference_id":"457","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/457"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/","reference_id":"BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html","reference_id":"msg00033.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231208-0007/","reference_id":"ntap-20231208-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231208-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4498","reference_id":"RHSA-2023:4498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4569","reference_id":"RHSA-2023:4569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5193","reference_id":"RHSA-2023:5193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5193"},{"reference_url":"https://usn.ubuntu.com/6372-1/","reference_id":"USN-6372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2023-34969"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vk1a-p2pv-67gy"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51468?format=json","vulnerability_id":"VCID-mjps-b9wy-wkgq","summary":"An authentication bypass was discovered in D-Bus.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12749","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0762","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07631","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/108751","reference_id":"108751","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://www.securityfocus.com/bid/108751"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/16","reference_id":"16","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://seclists.org/bugtraq/2019/Jun/16"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719344","reference_id":"1719344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719344"},{"reference_url":"https://www.openwall.com/lists/oss-security/2019/06/11/2","reference_id":"2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://www.openwall.com/lists/oss-security/2019/06/11/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/11/2","reference_id":"2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/06/11/2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375","reference_id":"930375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375"},{"reference_url":"https://security.archlinux.org/ASA-201906-16","reference_id":"ASA-201906-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201906-16"},{"reference_url":"https://security.archlinux.org/AVG-974","reference_id":"AVG-974","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-974"},{"reference_url":"https://www.debian.org/security/2019/dsa-4462","reference_id":"dsa-4462","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://www.debian.org/security/2019/dsa-4462"},{"reference_url":"https://security.gentoo.org/glsa/201909-08","reference_id":"GLSA-201909-08","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://security.gentoo.org/glsa/201909-08"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html","reference_id":"msg00059.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html","reference_id":"msg00092.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1726","reference_id":"RHSA-2019:1726","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2868","reference_id":"RHSA-2019:2868","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2870","reference_id":"RHSA-2019:2870","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3707","reference_id":"RHSA-2019:3707","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4032","reference_id":"RHSA-2020:4032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4015-1/","reference_id":"USN-4015-1","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://usn.ubuntu.com/4015-1/"},{"reference_url":"https://usn.ubuntu.com/4015-2/","reference_id":"USN-4015-2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://usn.ubuntu.com/4015-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/","reference_id":"V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037642?format=json","purl":"pkg:deb/debian/dbus@1.10.32-0%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.10.32-0%252Bdeb9u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1052149?format=json","purl":"pkg:deb/debian/dbus@1.12.20-0%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.20-0%252Bdeb10u1"}],"aliases":["CVE-2019-12749"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjps-b9wy-wkgq"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.10.32-0%252Bdeb9u1"}