{"url":"http://public2.vulnerablecode.io/api/packages/468464?format=json","purl":"pkg:apk/alpine/dbus@1.14.4-r0?arch=ppc64le&distroversion=v3.16&reponame=main","type":"apk","namespace":"alpine","name":"dbus","version":"1.14.4-r0","qualifiers":{"arch":"ppc64le","distroversion":"v3.16","reponame":"main"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56445?format=json","vulnerability_id":"VCID-agt1-wqw8-mbgf","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42011","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33886","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133617","reference_id":"2133617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133617"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/413","reference_id":"413","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/413"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/468464?format=json","purl":"pkg:apk/alpine/dbus@1.14.4-r0?arch=ppc64le&distroversion=v3.16&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dbus@1.14.4-r0%3Farch=ppc64le&distroversion=v3.16&reponame=main"}],"aliases":["CVE-2022-42011"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agt1-wqw8-mbgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56446?format=json","vulnerability_id":"VCID-fh3r-yj4m-bbhs","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42012","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43242","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44486","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133618","reference_id":"2133618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133618"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/417","reference_id":"417","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/417"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/468464?format=json","purl":"pkg:apk/alpine/dbus@1.14.4-r0?arch=ppc64le&distroversion=v3.16&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dbus@1.14.4-r0%3Farch=ppc64le&distroversion=v3.16&reponame=main"}],"aliases":["CVE-2022-42012"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3r-yj4m-bbhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56444?format=json","vulnerability_id":"VCID-fru7-rpdb-5fft","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42010","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22447","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133616","reference_id":"2133616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133616"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/418","reference_id":"418","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/418"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/468464?format=json","purl":"pkg:apk/alpine/dbus@1.14.4-r0?arch=ppc64le&distroversion=v3.16&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dbus@1.14.4-r0%3Farch=ppc64le&distroversion=v3.16&reponame=main"}],"aliases":["CVE-2022-42010"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fru7-rpdb-5fft"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dbus@1.14.4-r0%3Farch=ppc64le&distroversion=v3.16&reponame=main"}