{"url":"http://public2.vulnerablecode.io/api/packages/571106?format=json","purl":"pkg:deb/debian/dbus@1.0.2-1","type":"deb","namespace":"debian","name":"dbus","version":"1.0.2-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.12.28-0+deb11u1","latest_non_vulnerable_version":"1.12.28-0+deb11u1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57671?format=json","vulnerability_id":"VCID-1167-3ujz-zkcx","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0294.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0294.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/07/02/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/07/02/4"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3533.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3533","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25338","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25536","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25421","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25391","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3533"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=79694","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=79694"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=80469","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=80469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533"},{"reference_url":"http://secunia.com/advisories/59611","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59611"},{"reference_url":"http://secunia.com/advisories/59798","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59798"},{"reference_url":"http://secunia.com/advisories/60236","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60236"},{"reference_url":"http://www.debian.org/security/2014/dsa-2971","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2971"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1114416","reference_id":"1114416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1114416"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3533","reference_id":"CVE-2014-3533","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3533"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2275-1/","reference_id":"USN-2275-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2275-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3533"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1167-3ujz-zkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60692?format=json","vulnerability_id":"VCID-1a4r-nfu5-nka1","summary":"Multiple vulnerabilities were found in D-Bus, the worst of which\n    allowing for a symlink attack.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2533.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2533","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08598","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08658","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2533"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=715540","reference_id":"715540","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=715540"},{"reference_url":"https://security.gentoo.org/glsa/201110-14","reference_id":"GLSA-201110-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-14"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"}],"aliases":["CVE-2011-2533"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1a4r-nfu5-nka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60693?format=json","vulnerability_id":"VCID-2j9s-7y5m-u3d7","summary":"A local Denial of Service vulnerability was discovered in D-Bus.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12049.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12049","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25969","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26074","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26012","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26064","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849041","reference_id":"1849041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849041"},{"reference_url":"https://security.archlinux.org/ASA-202006-9","reference_id":"ASA-202006-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202006-9"},{"reference_url":"https://security.archlinux.org/AVG-1183","reference_id":"AVG-1183","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1183"},{"reference_url":"https://security.gentoo.org/glsa/202007-46","reference_id":"GLSA-202007-46","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2894","reference_id":"RHSA-2020:2894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3014","reference_id":"RHSA-2020:3014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3044","reference_id":"RHSA-2020:3044","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3298","reference_id":"RHSA-2020:3298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3298"},{"reference_url":"https://usn.ubuntu.com/4398-1/","reference_id":"USN-4398-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4398-1/"},{"reference_url":"https://usn.ubuntu.com/4398-2/","reference_id":"USN-4398-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4398-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052149?format=json","purl":"pkg:deb/debian/dbus@1.12.20-0%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.20-0%252Bdeb10u1"}],"aliases":["CVE-2020-12049"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2j9s-7y5m-u3d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57757?format=json","vulnerability_id":"VCID-4jyp-vg8c-9ycd","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0395.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0395.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3638.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3638","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27118","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27159","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27102","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27105","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27061","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3638"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=81053","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=81053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639"},{"reference_url":"http://secunia.com/advisories/61378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61378"},{"reference_url":"http://secunia.com/advisories/61431","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61431"},{"reference_url":"http://www.debian.org/security/2014/dsa-3026","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3026"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/16/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/16/9"},{"reference_url":"http://www.securitytracker.com/id/1030864","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030864"},{"reference_url":"http://www.ubuntu.com/usn/USN-2352-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2352-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140529","reference_id":"1140529","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140529"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3638","reference_id":"CVE-2014-3638","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3638"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2352-1/","reference_id":"USN-2352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2352-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3638"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jyp-vg8c-9ycd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33674?format=json","vulnerability_id":"VCID-841n-g3as-jfac","summary":"An error condition can cause D-Bus to crash.","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3834.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3834","reference_id":"","reference_type":"","scores":[{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82943","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82959","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83011","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3834"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=17803","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=17803"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834"},{"reference_url":"http://secunia.com/advisories/32127","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32127"},{"reference_url":"http://secunia.com/advisories/32230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32230"},{"reference_url":"http://secunia.com/advisories/32281","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32281"},{"reference_url":"http://secunia.com/advisories/32385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32385"},{"reference_url":"http://secunia.com/advisories/33396","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33396"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45701","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45701"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253"},{"reference_url":"https://www.exploit-db.com/exploits/7822","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/7822"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html"},{"reference_url":"http://www.debian.org/security/2008/dsa-1658","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1658"},{"reference_url":"http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88a","reference_id":"","reference_type":"","scores":[],"url":"http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88a"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:213","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:213"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0008.html"},{"reference_url":"http://www.securityfocus.com/bid/31602","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31602"},{"reference_url":"http://www.securitytracker.com/id?1021063","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021063"},{"reference_url":"http://www.ubuntu.com/usn/usn-653-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-653-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2762","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2762"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=464674","reference_id":"464674","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=464674"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501443","reference_id":"501443","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501443"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus1.0:rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus1.0:rc2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus1.0:rc3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.1.0:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus1.1.0:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.1.0:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/7822.c","reference_id":"CVE-2008-3834","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/7822.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3834","reference_id":"CVE-2008-3834","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3834"},{"reference_url":"https://security.gentoo.org/glsa/200901-04","reference_id":"GLSA-200901-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200901-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0008","reference_id":"RHSA-2009:0008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0008"},{"reference_url":"https://usn.ubuntu.com/653-1/","reference_id":"USN-653-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/653-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571108?format=json","purl":"pkg:deb/debian/dbus@1.2.1-5%2Blenny2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-1a4r-nfu5-nka1"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-acpr-xua6-27cv"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz2n-vp61-nyh2"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-s4xn-z1py-9bbs"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-u1a5-18hy-nqfa"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.1-5%252Blenny2"}],"aliases":["CVE-2008-3834"],"risk_score":3.8,"exploitability":"2.0","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-841n-g3as-jfac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50764?format=json","vulnerability_id":"VCID-9fgm-rkzm-1uhw","summary":"A vulnerability has been found in D-Bus which allows a local user\n    to cause a Denial of Service.","references":[{"reference_url":"http://cgit.freedesktop.org/dbus/dbus/commit/?id=954d75b2b64e4799f360d2a6bf9cff6d9fee37e7","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/dbus/dbus/commit/?id=954d75b2b64e4799f360d2a6bf9cff6d9fee37e7"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109896.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109896.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/110114.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/110114.html"},{"reference_url":"http://lists.freedesktop.org/archives/dbus/2013-June/015696.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/dbus/2013-June/015696.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2168.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2168","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25673","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25758","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25731","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168"},{"reference_url":"http://secunia.com/advisories/53317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53317"},{"reference_url":"http://secunia.com/advisories/53832","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53832"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16881","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16881"},{"reference_url":"http://www.debian.org/security/2013/dsa-2707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:177","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:177"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/06/13/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/06/13/2"},{"reference_url":"http://www.securityfocus.com/bid/60546","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60546"},{"reference_url":"http://www.securitytracker.com/id/1028667","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1028667"},{"reference_url":"http://www.ubuntu.com/usn/USN-1874-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1874-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=974109","reference_id":"974109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=974109"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2168","reference_id":"CVE-2013-2168","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2168"},{"reference_url":"https://security.gentoo.org/glsa/201308-02","reference_id":"GLSA-201308-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-02"},{"reference_url":"https://usn.ubuntu.com/1874-1/","reference_id":"USN-1874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1874-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2013-2168"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9fgm-rkzm-1uhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60690?format=json","vulnerability_id":"VCID-acpr-xua6-27cv","summary":"Multiple vulnerabilities were found in D-Bus, the worst of which\n    allowing for a symlink attack.","references":[{"reference_url":"http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/16/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/16/3"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/16/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/16/6"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/21/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/21/3"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4352.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4352.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4352","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27568","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27571","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4352"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=32321","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=32321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352"},{"reference_url":"http://secunia.com/advisories/42580","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42580"},{"reference_url":"http://secunia.com/advisories/42760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42760"},{"reference_url":"http://secunia.com/advisories/42911","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42911"},{"reference_url":"http://secunia.com/advisories/42960","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42960"},{"reference_url":"http://www.debian.org/security/2011/dsa-2149","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2149"},{"reference_url":"http://www.remlab.net/op/dbus-variant-recursion.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://www.remlab.net/op/dbus-variant-recursion.shtml"},{"reference_url":"http://www.securityfocus.com/bid/45377","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45377"},{"reference_url":"http://www.ubuntu.com/usn/USN-1044-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1044-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3325","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3325"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0161","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0161"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0178","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0178"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0464","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0464"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=663673","reference_id":"663673","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=663673"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4352","reference_id":"CVE-2010-4352","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4352"},{"reference_url":"https://security.gentoo.org/glsa/201110-14","reference_id":"GLSA-201110-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0376","reference_id":"RHSA-2011:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0376"},{"reference_url":"https://usn.ubuntu.com/1044-1/","reference_id":"USN-1044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1044-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571109?format=json","purl":"pkg:deb/debian/dbus@1.2.24-4%2Bsqueeze2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-1a4r-nfu5-nka1"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz2n-vp61-nyh2"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-s4xn-z1py-9bbs"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.24-4%252Bsqueeze2"}],"aliases":["CVE-2010-4352"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-acpr-xua6-27cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56445?format=json","vulnerability_id":"VCID-agt1-wqw8-mbgf","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42011","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33886","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133617","reference_id":"2133617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133617"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/413","reference_id":"413","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/413"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2022-42011"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agt1-wqw8-mbgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57756?format=json","vulnerability_id":"VCID-dwwp-hsmw-b3fm","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0395.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0395.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3637.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3637","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16097","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16038","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3637"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=80559","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=80559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639"},{"reference_url":"http://secunia.com/advisories/61378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61378"},{"reference_url":"http://www.debian.org/security/2014/dsa-3026","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3026"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/16/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/16/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/24/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/24/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/24/14","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/24/14"},{"reference_url":"http://www.securitytracker.com/id/1030864","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030864"},{"reference_url":"http://www.ubuntu.com/usn/USN-2352-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2352-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140527","reference_id":"1140527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140527"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3637","reference_id":"CVE-2014-3637","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3637"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2352-1/","reference_id":"USN-2352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2352-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3637"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dwwp-hsmw-b3fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57670?format=json","vulnerability_id":"VCID-fduk-sggr-2qaw","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0294.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0294.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/07/02/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/07/02/4"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3532.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3532.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3532","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31387","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31524","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31567","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31438","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31429","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3532"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=80163","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=80163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533"},{"reference_url":"http://secunia.com/advisories/59611","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59611"},{"reference_url":"http://secunia.com/advisories/59798","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59798"},{"reference_url":"http://secunia.com/advisories/60236","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60236"},{"reference_url":"http://www.debian.org/security/2014/dsa-2971","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2971"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1114414","reference_id":"1114414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1114414"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3532","reference_id":"CVE-2014-3532","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3532"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2275-1/","reference_id":"USN-2275-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2275-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3532"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fduk-sggr-2qaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56446?format=json","vulnerability_id":"VCID-fh3r-yj4m-bbhs","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42012","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43242","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44486","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133618","reference_id":"2133618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133618"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/417","reference_id":"417","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/417"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2022-42012"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3r-yj4m-bbhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56444?format=json","vulnerability_id":"VCID-fru7-rpdb-5fft","summary":"Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42010","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22447","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/06/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133616","reference_id":"2133616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133616"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/418","reference_id":"418","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/418"},{"reference_url":"https://security.archlinux.org/AVG-2805","reference_id":"AVG-2805","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2805"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/","reference_id":"E4CO7N226I3X5FNBR2MACCH6TS764VJP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/"},{"reference_url":"https://security.gentoo.org/glsa/202305-08","reference_id":"GLSA-202305-08","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://security.gentoo.org/glsa/202305-08"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/","reference_id":"ND74SKN56BCYL3QLEAAB6E64UUBRA5UG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8812","reference_id":"RHSA-2022:8812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8977","reference_id":"RHSA-2022:8977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0096","reference_id":"RHSA-2023:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0335","reference_id":"RHSA-2023:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0335"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/","reference_id":"SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/"},{"reference_url":"https://usn.ubuntu.com/5704-1/","reference_id":"USN-5704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5704-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2022-42010"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fru7-rpdb-5fft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57669?format=json","vulnerability_id":"VCID-j7hb-4ppz-p3hp","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0266.html","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://advisories.mageia.org/MGASA-2014-0266.html"},{"reference_url":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3477","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24537","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24608","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24631","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26844","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26801","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3477"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=78979","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=78979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533"},{"reference_url":"http://seclists.org/oss-sec/2014/q2/509","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://seclists.org/oss-sec/2014/q2/509"},{"reference_url":"http://secunia.com/advisories/59428","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://secunia.com/advisories/59428"},{"reference_url":"http://secunia.com/advisories/59611","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://secunia.com/advisories/59611"},{"reference_url":"http://secunia.com/advisories/59798","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://secunia.com/advisories/59798"},{"reference_url":"http://www.debian.org/security/2014/dsa-2971","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://www.debian.org/security/2014/dsa-2971"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.securityfocus.com/bid/67986","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/"}],"url":"http://www.securityfocus.com/bid/67986"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1104791","reference_id":"1104791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1104791"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3477","reference_id":"CVE-2014-3477","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3477"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2275-1/","reference_id":"USN-2275-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2275-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3477"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7hb-4ppz-p3hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88519?format=json","vulnerability_id":"VCID-jpgs-a4kn-auc6","summary":"dbus security policy circumvention","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0595.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0595","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1964","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19685","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1969","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19582","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=432419","reference_id":"432419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=432419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0159","reference_id":"RHSA-2008:0159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0159"},{"reference_url":"https://usn.ubuntu.com/653-1/","reference_id":"USN-653-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/653-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571108?format=json","purl":"pkg:deb/debian/dbus@1.2.1-5%2Blenny2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-1a4r-nfu5-nka1"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-acpr-xua6-27cv"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz2n-vp61-nyh2"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-s4xn-z1py-9bbs"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-u1a5-18hy-nqfa"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.1-5%252Blenny2"}],"aliases":["CVE-2008-0595"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jpgs-a4kn-auc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60691?format=json","vulnerability_id":"VCID-jz2n-vp61-nyh2","summary":"Multiple vulnerabilities were found in D-Bus, the worst of which\n    allowing for a symlink attack.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2200.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2200.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2200","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27015","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26948","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26998","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26953","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26895","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2200"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938","reference_id":"629938","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=712676","reference_id":"712676","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=712676"},{"reference_url":"https://security.gentoo.org/glsa/201110-14","reference_id":"GLSA-201110-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1132","reference_id":"RHSA-2011:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1132"},{"reference_url":"https://usn.ubuntu.com/1176-1/","reference_id":"USN-1176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"}],"aliases":["CVE-2011-2200"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jz2n-vp61-nyh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57755?format=json","vulnerability_id":"VCID-jz46-dun9-h7a1","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0395.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://advisories.mageia.org/MGASA-2014-0395.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3636.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3636","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26611","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26721","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3636"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=82820","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=82820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639"},{"reference_url":"http://secunia.com/advisories/61378","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://secunia.com/advisories/61378"},{"reference_url":"http://www.debian.org/security/2014/dsa-3026","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://www.debian.org/security/2014/dsa-3026"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/16/9","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://www.openwall.com/lists/oss-security/2014/09/16/9"},{"reference_url":"http://www.securitytracker.com/id/1030864","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://www.securitytracker.com/id/1030864"},{"reference_url":"http://www.ubuntu.com/usn/USN-2352-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/"}],"url":"http://www.ubuntu.com/usn/USN-2352-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140525","reference_id":"1140525","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140525"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3636","reference_id":"CVE-2014-3636","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3636"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2352-1/","reference_id":"USN-2352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2352-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3636"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jz46-dun9-h7a1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81121?format=json","vulnerability_id":"VCID-m1tk-vryk-pfbu","summary":"dbus: users with the same numeric UID could lead to use-after-free and undefined behaviour","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35512.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35512","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09804","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09755","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1909101","reference_id":"1909101","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1909101"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128","reference_id":"305#note_829128","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128"},{"reference_url":"https://bugs.gentoo.org/755392","reference_id":"755392","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://bugs.gentoo.org/755392"},{"reference_url":"https://security.archlinux.org/AVG-1573","reference_id":"AVG-1573","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1573"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2020-35512","reference_id":"CVE-2020-35512","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2020-35512"},{"reference_url":"https://usn.ubuntu.com/5244-1/","reference_id":"USN-5244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5244-1/"},{"reference_url":"https://usn.ubuntu.com/5244-2/","reference_id":"USN-5244-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5244-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2020-35512"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1tk-vryk-pfbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57758?format=json","vulnerability_id":"VCID-m65e-8xzj-tuh1","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0395.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0395.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3639.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3639","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27782","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27879","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27934","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27883","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2784","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3639"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=80919","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=80919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639"},{"reference_url":"http://secunia.com/advisories/61378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61378"},{"reference_url":"http://secunia.com/advisories/61431","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61431"},{"reference_url":"http://www.debian.org/security/2014/dsa-3026","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3026"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/16/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/16/9"},{"reference_url":"http://www.securitytracker.com/id/1030864","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030864"},{"reference_url":"http://www.ubuntu.com/usn/USN-2352-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2352-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140532","reference_id":"1140532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140532"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3639","reference_id":"CVE-2014-3639","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3639"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2352-1/","reference_id":"USN-2352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2352-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3639"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m65e-8xzj-tuh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51468?format=json","vulnerability_id":"VCID-mjps-b9wy-wkgq","summary":"An authentication bypass was discovered in D-Bus.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12749","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0762","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07631","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/108751","reference_id":"108751","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://www.securityfocus.com/bid/108751"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/16","reference_id":"16","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://seclists.org/bugtraq/2019/Jun/16"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719344","reference_id":"1719344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719344"},{"reference_url":"https://www.openwall.com/lists/oss-security/2019/06/11/2","reference_id":"2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://www.openwall.com/lists/oss-security/2019/06/11/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/11/2","reference_id":"2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/06/11/2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375","reference_id":"930375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375"},{"reference_url":"https://security.archlinux.org/ASA-201906-16","reference_id":"ASA-201906-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201906-16"},{"reference_url":"https://security.archlinux.org/AVG-974","reference_id":"AVG-974","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-974"},{"reference_url":"https://www.debian.org/security/2019/dsa-4462","reference_id":"dsa-4462","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://www.debian.org/security/2019/dsa-4462"},{"reference_url":"https://security.gentoo.org/glsa/201909-08","reference_id":"GLSA-201909-08","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://security.gentoo.org/glsa/201909-08"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html","reference_id":"msg00059.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html","reference_id":"msg00092.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1726","reference_id":"RHSA-2019:1726","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2868","reference_id":"RHSA-2019:2868","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2870","reference_id":"RHSA-2019:2870","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3707","reference_id":"RHSA-2019:3707","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4032","reference_id":"RHSA-2020:4032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4015-1/","reference_id":"USN-4015-1","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://usn.ubuntu.com/4015-1/"},{"reference_url":"https://usn.ubuntu.com/4015-2/","reference_id":"USN-4015-2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://usn.ubuntu.com/4015-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/","reference_id":"V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037642?format=json","purl":"pkg:deb/debian/dbus@1.10.32-0%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.10.32-0%252Bdeb9u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1052149?format=json","purl":"pkg:deb/debian/dbus@1.12.20-0%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.20-0%252Bdeb10u1"}],"aliases":["CVE-2019-12749"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjps-b9wy-wkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50211?format=json","vulnerability_id":"VCID-mn9w-cnut-17d4","summary":"A vulnerability has been found in D-Bus, possibly resulting in\n    local Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0245.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0245.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0245","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25994","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25797","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0245"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1186775","reference_id":"1186775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1186775"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777545","reference_id":"777545","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777545"},{"reference_url":"https://security.gentoo.org/glsa/201503-02","reference_id":"GLSA-201503-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-02"},{"reference_url":"https://usn.ubuntu.com/3116-1/","reference_id":"USN-3116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3116-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2015-0245"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mn9w-cnut-17d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58020?format=json","vulnerability_id":"VCID-nw3v-9jph-qkfx","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0457.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0457.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7824.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7824","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26114","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26236","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26008","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26074","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26126","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26135","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2609","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7824"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=85105","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=85105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824"},{"reference_url":"http://secunia.com/advisories/62603","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62603"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98576","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98576"},{"reference_url":"http://www.debian.org/security/2014/dsa-3099","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3099"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/11/10/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/11/10/2"},{"reference_url":"http://www.securityfocus.com/bid/71012","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71012"},{"reference_url":"http://www.ubuntu.com/usn/USN-2425-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2425-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1173555","reference_id":"1173555","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1173555"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7824","reference_id":"CVE-2014-7824","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7824"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2425-1/","reference_id":"USN-2425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2425-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-7824"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nw3v-9jph-qkfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36938?format=json","vulnerability_id":"VCID-s4xn-z1py-9bbs","summary":"A vulnerability has been found in D-Bus which allows local\n    attackers to gain escalated privileges.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1261.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1261.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3524.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3524","reference_id":"","reference_type":"","scores":[{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.9793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.52378","scoring_system":"epss","scoring_elements":"0.97928","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3524"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=52202","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=52202"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=697105","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=697105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524"},{"reference_url":"http://secunia.com/advisories/50537","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50537"},{"reference_url":"http://secunia.com/advisories/50544","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50544"},{"reference_url":"http://secunia.com/advisories/50710","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50710"},{"reference_url":"http://stealth.openwall.net/null/dzug.c","reference_id":"","reference_type":"","scores":[],"url":"http://stealth.openwall.net/null/dzug.c"},{"reference_url":"http://www.exploit-db.com/exploits/21323","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/21323"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:070","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:083","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:083"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/07/10/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/07/10/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/07/26/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/07/26/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/12/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/12/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/14/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/14/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/17/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/17/2"},{"reference_url":"http://www.securityfocus.com/bid/55517","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55517"},{"reference_url":"http://www.ubuntu.com/usn/USN-1576-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1576-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1576-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1576-2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689070","reference_id":"689070","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689070"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=847402","reference_id":"847402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=847402"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3524","reference_id":"CVE-2012-3524","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3524"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21323.c","reference_id":"CVE-2012-3524;OSVDB-85480;CVE-2012-4425","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21323.c"},{"reference_url":"https://security.gentoo.org/glsa/201406-01","reference_id":"GLSA-201406-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1261","reference_id":"RHSA-2012:1261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1261"},{"reference_url":"https://usn.ubuntu.com/1576-1/","reference_id":"USN-1576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1576-1/"},{"reference_url":"https://usn.ubuntu.com/1576-2/","reference_id":"USN-1576-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1576-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"}],"aliases":["CVE-2012-3524"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s4xn-z1py-9bbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57754?format=json","vulnerability_id":"VCID-sw3b-9qzk-nqge","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0395.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0395.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3635.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3635","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38703","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38705","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38688","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3635"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=83622","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=83622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639"},{"reference_url":"http://secunia.com/advisories/61378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61378"},{"reference_url":"http://www.debian.org/security/2014/dsa-3026","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3026"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/16/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/16/9"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1030864","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030864"},{"reference_url":"http://www.ubuntu.com/usn/USN-2352-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2352-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140523","reference_id":"1140523","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140523"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3635","reference_id":"CVE-2014-3635","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3635"},{"reference_url":"https://security.gentoo.org/glsa/201412-12","reference_id":"GLSA-201412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-12"},{"reference_url":"https://usn.ubuntu.com/2352-1/","reference_id":"USN-2352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2352-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571111?format=json","purl":"pkg:deb/debian/dbus@1.6.8-1%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037640?format=json","purl":"pkg:deb/debian/dbus@1.8.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1"}],"aliases":["CVE-2014-3635"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sw3b-9qzk-nqge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88181?format=json","vulnerability_id":"VCID-u1a5-18hy-nqfa","summary":"dbus: invalid fix for CVE-2008-3834","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1189.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1189","reference_id":"","reference_type":"","scores":[{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78042","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.7805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78062","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78088","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78092","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78097","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=496672","reference_id":"496672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=496672"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532720","reference_id":"532720","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0018","reference_id":"RHSA-2010:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0018"},{"reference_url":"https://usn.ubuntu.com/799-1/","reference_id":"USN-799-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/799-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571109?format=json","purl":"pkg:deb/debian/dbus@1.2.24-4%2Bsqueeze2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-1a4r-nfu5-nka1"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz2n-vp61-nyh2"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-s4xn-z1py-9bbs"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.24-4%252Bsqueeze2"}],"aliases":["CVE-2009-1189"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1a5-18hy-nqfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78359?format=json","vulnerability_id":"VCID-vk1a-p2pv-67gy","summary":"dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34969.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34969","reference_id":"","reference_type":"","scores":[{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71349","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037151","reference_id":"1037151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213166","reference_id":"2213166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213166"},{"reference_url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/457","reference_id":"457","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://gitlab.freedesktop.org/dbus/dbus/-/issues/457"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/","reference_id":"BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html","reference_id":"msg00033.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231208-0007/","reference_id":"ntap-20231208-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231208-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4498","reference_id":"RHSA-2023:4498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4569","reference_id":"RHSA-2023:4569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5193","reference_id":"RHSA-2023:5193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5193"},{"reference_url":"https://usn.ubuntu.com/6372-1/","reference_id":"USN-6372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052150?format=json","purl":"pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1"}],"aliases":["CVE-2023-34969"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vk1a-p2pv-67gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88283?format=json","vulnerability_id":"VCID-zzrk-cm9s-cfhd","summary":"dbus: incorrect use of [send|receive]_requested_reply policy rule attribute in system.conf","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503532","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503532"},{"reference_url":"http://forums.fedoraforum.org/showthread.php?t=206797","reference_id":"","reference_type":"","scores":[],"url":"http://forums.fedoraforum.org/showthread.php?t=206797"},{"reference_url":"http://lists.freedesktop.org/archives/dbus/2008-December/010702.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/dbus/2008-December/010702.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4311.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4311","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09754","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13366","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1341","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13497","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1347","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13509","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4311"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=18229","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=18229"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=474895","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=474895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311"},{"reference_url":"http://secunia.com/advisories/33047","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33047"},{"reference_url":"http://secunia.com/advisories/33055","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33055"},{"reference_url":"http://secunia.com/advisories/34360","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34360"},{"reference_url":"http://secunia.com/advisories/34642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34642"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47138","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47138"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00436.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00436.html"},{"reference_url":"http://www.securityfocus.com/bid/32674","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32674"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3355","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3355"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=469151","reference_id":"469151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=469151"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508032","reference_id":"508032","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508032"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:dbus:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4311","reference_id":"CVE-2008-4311","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4311"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571108?format=json","purl":"pkg:deb/debian/dbus@1.2.1-5%2Blenny2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-1a4r-nfu5-nka1"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-acpr-xua6-27cv"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jz2n-vp61-nyh2"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-s4xn-z1py-9bbs"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-u1a5-18hy-nqfa"},{"vulnerability":"VCID-vk1a-p2pv-67gy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.1-5%252Blenny2"}],"aliases":["CVE-2008-4311"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zzrk-cm9s-cfhd"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88786?format=json","vulnerability_id":"VCID-2hkt-xnce-xqd5","summary":"D-Bus denial of service","references":[{"reference_url":"http://archives.mandrivalinux.com/security-announce/2006-12/msg00025.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.mandrivalinux.com/security-announce/2006-12/msg00025.php"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html"},{"reference_url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000147.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000147.html"},{"reference_url":"http://openpkg.com/go/OpenPKG-SA-2006.041","reference_id":"","reference_type":"","scores":[],"url":"http://openpkg.com/go/OpenPKG-SA-2006.041"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6107.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6107.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6107","reference_id":"","reference_type":"","scores":[{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32429","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32591","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.3249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32456","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6107"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=9142","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=9142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6107","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6107"},{"reference_url":"http://secunia.com/advisories/23373","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23373"},{"reference_url":"http://secunia.com/advisories/23390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23390"},{"reference_url":"http://secunia.com/advisories/23611","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23611"},{"reference_url":"http://secunia.com/advisories/24059","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24059"},{"reference_url":"http://secunia.com/advisories/24131","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24131"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30874","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30874"},{"reference_url":"https://issues.rpath.com/browse/RPL-860","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-860"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9951","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9951"},{"reference_url":"http://www.freedesktop.org/wiki/Software/dbus","reference_id":"","reference_type":"","scores":[],"url":"http://www.freedesktop.org/wiki/Software/dbus"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0008.html"},{"reference_url":"http://www.securityfocus.com/bid/21571","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21571"},{"reference_url":"http://www.securitytracker.com/id?1017608","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017608"},{"reference_url":"http://www.ubuntu.com/usn/usn-401-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-401-1"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4988","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/4988"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=219665","reference_id":"219665","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=219665"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus:d-bus:0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus:d-bus:0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus:d-bus:0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus:d-bus:0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus:d-bus:0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus:d-bus:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:d-bus:d-bus:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6107","reference_id":"CVE-2006-6107","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0008","reference_id":"RHSA-2007:0008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0008"},{"reference_url":"https://usn.ubuntu.com/401-1/","reference_id":"USN-401-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/401-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571106?format=json","purl":"pkg:deb/debian/dbus@1.0.2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1167-3ujz-zkcx"},{"vulnerability":"VCID-1a4r-nfu5-nka1"},{"vulnerability":"VCID-2j9s-7y5m-u3d7"},{"vulnerability":"VCID-4jyp-vg8c-9ycd"},{"vulnerability":"VCID-841n-g3as-jfac"},{"vulnerability":"VCID-9fgm-rkzm-1uhw"},{"vulnerability":"VCID-acpr-xua6-27cv"},{"vulnerability":"VCID-agt1-wqw8-mbgf"},{"vulnerability":"VCID-dwwp-hsmw-b3fm"},{"vulnerability":"VCID-fduk-sggr-2qaw"},{"vulnerability":"VCID-fh3r-yj4m-bbhs"},{"vulnerability":"VCID-fru7-rpdb-5fft"},{"vulnerability":"VCID-j7hb-4ppz-p3hp"},{"vulnerability":"VCID-jpgs-a4kn-auc6"},{"vulnerability":"VCID-jz2n-vp61-nyh2"},{"vulnerability":"VCID-jz46-dun9-h7a1"},{"vulnerability":"VCID-m1tk-vryk-pfbu"},{"vulnerability":"VCID-m65e-8xzj-tuh1"},{"vulnerability":"VCID-mjps-b9wy-wkgq"},{"vulnerability":"VCID-mn9w-cnut-17d4"},{"vulnerability":"VCID-nw3v-9jph-qkfx"},{"vulnerability":"VCID-s4xn-z1py-9bbs"},{"vulnerability":"VCID-sw3b-9qzk-nqge"},{"vulnerability":"VCID-u1a5-18hy-nqfa"},{"vulnerability":"VCID-vk1a-p2pv-67gy"},{"vulnerability":"VCID-zzrk-cm9s-cfhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.0.2-1"}],"aliases":["CVE-2006-6107"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hkt-xnce-xqd5"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.0.2-1"}