Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/dbus@1.16.2-2?distro=trixie
Typedeb
Namespacedebian
Namedbus
Version1.16.2-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.16.2-4
Latest_non_vulnerable_version1.16.2-4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1167-3ujz-zkcx
vulnerability_id VCID-1167-3ujz-zkcx
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0294.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0294.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
2
reference_url http://openwall.com/lists/oss-security/2014/07/02/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/07/02/4
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3533.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3533.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3533
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25345
published_at 2026-04-16T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25434
published_at 2026-04-01T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.255
published_at 2026-04-02T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25536
published_at 2026-04-04T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25309
published_at 2026-04-07T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25377
published_at 2026-04-08T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25421
published_at 2026-04-09T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25433
published_at 2026-04-11T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25391
published_at 2026-04-12T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25338
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3533
5
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=79694
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=79694
6
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=80469
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=80469
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
10
reference_url http://secunia.com/advisories/59611
reference_id
reference_type
scores
url http://secunia.com/advisories/59611
11
reference_url http://secunia.com/advisories/59798
reference_id
reference_type
scores
url http://secunia.com/advisories/59798
12
reference_url http://secunia.com/advisories/60236
reference_id
reference_type
scores
url http://secunia.com/advisories/60236
13
reference_url http://www.debian.org/security/2014/dsa-2971
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2971
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
15
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1114416
reference_id 1114416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1114416
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3533
reference_id CVE-2014-3533
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3533
56
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
57
reference_url https://usn.ubuntu.com/2275-1/
reference_id USN-2275-1
reference_type
scores
url https://usn.ubuntu.com/2275-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.6-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.6-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3533
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1167-3ujz-zkcx
1
url VCID-1a4r-nfu5-nka1
vulnerability_id VCID-1a4r-nfu5-nka1
summary
Multiple vulnerabilities were found in D-Bus, the worst of which
    allowing for a symlink attack.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2533.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2533
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08598
published_at 2026-04-01T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-02T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08676
published_at 2026-04-04T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08595
published_at 2026-04-07T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.0867
published_at 2026-04-08T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08694
published_at 2026-04-11T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08671
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08658
published_at 2026-04-13T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08546
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2533
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=715540
reference_id 715540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=715540
4
reference_url https://security.gentoo.org/glsa/201110-14
reference_id GLSA-201110-14
reference_type
scores
url https://security.gentoo.org/glsa/201110-14
fixed_packages
0
url pkg:deb/debian/dbus@1.3.2~git20100715.821f99c-1?distro=trixie
purl pkg:deb/debian/dbus@1.3.2~git20100715.821f99c-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.3.2~git20100715.821f99c-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2011-2533
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1a4r-nfu5-nka1
2
url VCID-2hkt-xnce-xqd5
vulnerability_id VCID-2hkt-xnce-xqd5
summary D-Bus denial of service
references
0
reference_url http://archives.mandrivalinux.com/security-announce/2006-12/msg00025.php
reference_id
reference_type
scores
url http://archives.mandrivalinux.com/security-announce/2006-12/msg00025.php
1
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
2
reference_url http://lists.rpath.com/pipermail/security-announce/2007-February/000147.html
reference_id
reference_type
scores
url http://lists.rpath.com/pipermail/security-announce/2007-February/000147.html
3
reference_url http://openpkg.com/go/OpenPKG-SA-2006.041
reference_id
reference_type
scores
url http://openpkg.com/go/OpenPKG-SA-2006.041
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6107.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6107.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6107
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32465
published_at 2026-04-16T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32405
published_at 2026-04-01T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32555
published_at 2026-04-02T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32591
published_at 2026-04-04T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32415
published_at 2026-04-07T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32463
published_at 2026-04-08T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.3249
published_at 2026-04-09T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32494
published_at 2026-04-11T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32456
published_at 2026-04-12T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32429
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6107
6
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=9142
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=9142
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6107
8
reference_url http://secunia.com/advisories/23373
reference_id
reference_type
scores
url http://secunia.com/advisories/23373
9
reference_url http://secunia.com/advisories/23390
reference_id
reference_type
scores
url http://secunia.com/advisories/23390
10
reference_url http://secunia.com/advisories/23611
reference_id
reference_type
scores
url http://secunia.com/advisories/23611
11
reference_url http://secunia.com/advisories/24059
reference_id
reference_type
scores
url http://secunia.com/advisories/24059
12
reference_url http://secunia.com/advisories/24131
reference_id
reference_type
scores
url http://secunia.com/advisories/24131
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/30874
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/30874
14
reference_url https://issues.rpath.com/browse/RPL-860
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-860
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9951
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9951
16
reference_url http://www.freedesktop.org/wiki/Software/dbus
reference_id
reference_type
scores
url http://www.freedesktop.org/wiki/Software/dbus
17
reference_url http://www.redhat.com/support/errata/RHSA-2007-0008.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0008.html
18
reference_url http://www.securityfocus.com/bid/21571
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21571
19
reference_url http://www.securitytracker.com/id?1017608
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017608
20
reference_url http://www.ubuntu.com/usn/usn-401-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-401-1
21
reference_url http://www.vupen.com/english/advisories/2006/4988
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4988
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=219665
reference_id 219665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=219665
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.20:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.21:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.22:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:0.23:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:1.0.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6107
reference_id CVE-2006-6107
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6107
31
reference_url https://access.redhat.com/errata/RHSA-2007:0008
reference_id RHSA-2007:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0008
32
reference_url https://usn.ubuntu.com/401-1/
reference_id USN-401-1
reference_type
scores
url https://usn.ubuntu.com/401-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.0.2-1?distro=trixie
purl pkg:deb/debian/dbus@1.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2006-6107
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hkt-xnce-xqd5
3
url VCID-2j9s-7y5m-u3d7
vulnerability_id VCID-2j9s-7y5m-u3d7
summary A local Denial of Service vulnerability was discovered in D-Bus.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12049.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12049
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26052
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25973
published_at 2026-04-16T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26028
published_at 2026-04-12T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25969
published_at 2026-04-13T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26134
published_at 2026-04-02T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26174
published_at 2026-04-04T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.25945
published_at 2026-04-07T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-08T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26064
published_at 2026-04-09T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26074
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12049
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1849041
reference_id 1849041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1849041
5
reference_url https://security.archlinux.org/ASA-202006-9
reference_id ASA-202006-9
reference_type
scores
url https://security.archlinux.org/ASA-202006-9
6
reference_url https://security.archlinux.org/AVG-1183
reference_id AVG-1183
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1183
7
reference_url https://security.gentoo.org/glsa/202007-46
reference_id GLSA-202007-46
reference_type
scores
url https://security.gentoo.org/glsa/202007-46
8
reference_url https://access.redhat.com/errata/RHSA-2020:2894
reference_id RHSA-2020:2894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2894
9
reference_url https://access.redhat.com/errata/RHSA-2020:3014
reference_id RHSA-2020:3014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3014
10
reference_url https://access.redhat.com/errata/RHSA-2020:3044
reference_id RHSA-2020:3044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3044
11
reference_url https://access.redhat.com/errata/RHSA-2020:3298
reference_id RHSA-2020:3298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3298
12
reference_url https://usn.ubuntu.com/4398-1/
reference_id USN-4398-1
reference_type
scores
url https://usn.ubuntu.com/4398-1/
13
reference_url https://usn.ubuntu.com/4398-2/
reference_id USN-4398-2
reference_type
scores
url https://usn.ubuntu.com/4398-2/
fixed_packages
0
url pkg:deb/debian/dbus@1.12.18-1?distro=trixie
purl pkg:deb/debian/dbus@1.12.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.18-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2020-12049
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2j9s-7y5m-u3d7
4
url VCID-4jyp-vg8c-9ycd
vulnerability_id VCID-4jyp-vg8c-9ycd
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0395.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0395.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3638.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3638.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3638
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-16T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27118
published_at 2026-04-01T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27159
published_at 2026-04-02T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27195
published_at 2026-04-04T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26988
published_at 2026-04-07T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27056
published_at 2026-04-08T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27102
published_at 2026-04-09T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27105
published_at 2026-04-11T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27061
published_at 2026-04-12T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.27004
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3638
5
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=81053
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=81053
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
11
reference_url http://secunia.com/advisories/61378
reference_id
reference_type
scores
url http://secunia.com/advisories/61378
12
reference_url http://secunia.com/advisories/61431
reference_id
reference_type
scores
url http://secunia.com/advisories/61431
13
reference_url http://www.debian.org/security/2014/dsa-3026
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3026
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
15
reference_url http://www.openwall.com/lists/oss-security/2014/09/16/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/16/9
16
reference_url http://www.securitytracker.com/id/1030864
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030864
17
reference_url http://www.ubuntu.com/usn/USN-2352-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2352-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1140529
reference_id 1140529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1140529
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3638
reference_id CVE-2014-3638
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3638
37
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
38
reference_url https://usn.ubuntu.com/2352-1/
reference_id USN-2352-1
reference_type
scores
url https://usn.ubuntu.com/2352-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.8-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.8-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3638
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jyp-vg8c-9ycd
5
url VCID-841n-g3as-jfac
vulnerability_id VCID-841n-g3as-jfac
summary An error condition can cause D-Bus to crash.
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3834.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3834.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3834
reference_id
reference_type
scores
0
value 0.01853
scoring_system epss
scoring_elements 0.83045
published_at 2026-04-16T12:55:00Z
1
value 0.01853
scoring_system epss
scoring_elements 0.82943
published_at 2026-04-01T12:55:00Z
2
value 0.01853
scoring_system epss
scoring_elements 0.82959
published_at 2026-04-02T12:55:00Z
3
value 0.01853
scoring_system epss
scoring_elements 0.82972
published_at 2026-04-04T12:55:00Z
4
value 0.01853
scoring_system epss
scoring_elements 0.82969
published_at 2026-04-07T12:55:00Z
5
value 0.01853
scoring_system epss
scoring_elements 0.82994
published_at 2026-04-08T12:55:00Z
6
value 0.01853
scoring_system epss
scoring_elements 0.83001
published_at 2026-04-09T12:55:00Z
7
value 0.01853
scoring_system epss
scoring_elements 0.83017
published_at 2026-04-11T12:55:00Z
8
value 0.01853
scoring_system epss
scoring_elements 0.83011
published_at 2026-04-12T12:55:00Z
9
value 0.01853
scoring_system epss
scoring_elements 0.83007
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3834
5
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=17803
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=17803
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834
8
reference_url http://secunia.com/advisories/32127
reference_id
reference_type
scores
url http://secunia.com/advisories/32127
9
reference_url http://secunia.com/advisories/32230
reference_id
reference_type
scores
url http://secunia.com/advisories/32230
10
reference_url http://secunia.com/advisories/32281
reference_id
reference_type
scores
url http://secunia.com/advisories/32281
11
reference_url http://secunia.com/advisories/32385
reference_id
reference_type
scores
url http://secunia.com/advisories/32385
12
reference_url http://secunia.com/advisories/33396
reference_id
reference_type
scores
url http://secunia.com/advisories/33396
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45701
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45701
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253
15
reference_url https://www.exploit-db.com/exploits/7822
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/7822
16
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html
17
reference_url http://www.debian.org/security/2008/dsa-1658
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1658
18
reference_url http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88a
reference_id
reference_type
scores
url http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88a
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:213
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:213
20
reference_url http://www.redhat.com/support/errata/RHSA-2009-0008.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0008.html
21
reference_url http://www.securityfocus.com/bid/31602
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31602
22
reference_url http://www.securitytracker.com/id?1021063
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021063
23
reference_url http://www.ubuntu.com/usn/usn-653-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-653-1
24
reference_url http://www.vupen.com/english/advisories/2008/2762
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2762
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=464674
reference_id 464674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=464674
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501443
reference_id 501443
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501443
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus1.0:rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus1.0:rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus1.0:rc3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.0:rc3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.1.0:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus1.1.0:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus1.1.0:*:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*
71
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/7822.c
reference_id CVE-2008-3834
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/7822.c
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3834
reference_id CVE-2008-3834
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3834
73
reference_url https://security.gentoo.org/glsa/200901-04
reference_id GLSA-200901-04
reference_type
scores
url https://security.gentoo.org/glsa/200901-04
74
reference_url https://access.redhat.com/errata/RHSA-2009:0008
reference_id RHSA-2009:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0008
75
reference_url https://usn.ubuntu.com/653-1/
reference_id USN-653-1
reference_type
scores
url https://usn.ubuntu.com/653-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.2.1-4?distro=trixie
purl pkg:deb/debian/dbus@1.2.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.1-4%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2008-3834
risk_score 3.8
exploitability 2.0
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-841n-g3as-jfac
6
url VCID-9fgm-rkzm-1uhw
vulnerability_id VCID-9fgm-rkzm-1uhw
summary
A vulnerability has been found in D-Bus which allows a local user
    to cause a Denial of Service.
references
0
reference_url http://cgit.freedesktop.org/dbus/dbus/commit/?id=954d75b2b64e4799f360d2a6bf9cff6d9fee37e7
reference_id
reference_type
scores
url http://cgit.freedesktop.org/dbus/dbus/commit/?id=954d75b2b64e4799f360d2a6bf9cff6d9fee37e7
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109896.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109896.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-June/110114.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-June/110114.html
3
reference_url http://lists.freedesktop.org/archives/dbus/2013-June/015696.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/dbus/2013-June/015696.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2168.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2168.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2168
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25675
published_at 2026-04-16T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25758
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25829
published_at 2026-04-02T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-04T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25642
published_at 2026-04-07T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25713
published_at 2026-04-08T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.2576
published_at 2026-04-09T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25771
published_at 2026-04-11T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25731
published_at 2026-04-12T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25673
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2168
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
9
reference_url http://secunia.com/advisories/53317
reference_id
reference_type
scores
url http://secunia.com/advisories/53317
10
reference_url http://secunia.com/advisories/53832
reference_id
reference_type
scores
url http://secunia.com/advisories/53832
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16881
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16881
12
reference_url http://www.debian.org/security/2013/dsa-2707
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2707
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:177
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:177
14
reference_url http://www.openwall.com/lists/oss-security/2013/06/13/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/06/13/2
15
reference_url http://www.securityfocus.com/bid/60546
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60546
16
reference_url http://www.securitytracker.com/id/1028667
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028667
17
reference_url http://www.ubuntu.com/usn/USN-1874-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1874-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=974109
reference_id 974109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=974109
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2168
reference_id CVE-2013-2168
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2168
42
reference_url https://security.gentoo.org/glsa/201308-02
reference_id GLSA-201308-02
reference_type
scores
url https://security.gentoo.org/glsa/201308-02
43
reference_url https://usn.ubuntu.com/1874-1/
reference_id USN-1874-1
reference_type
scores
url https://usn.ubuntu.com/1874-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.6.12-1?distro=trixie
purl pkg:deb/debian/dbus@1.6.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.12-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2013-2168
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fgm-rkzm-1uhw
7
url VCID-acpr-xua6-27cv
vulnerability_id VCID-acpr-xua6-27cv
summary
Multiple vulnerabilities were found in D-Bus, the worst of which
    allowing for a symlink attack.
references
0
reference_url http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4
reference_id
reference_type
scores
url http://cgit.freedesktop.org/dbus/dbus/commit/?id=7d65a3a6ed8815e34a99c680ac3869fde49dbbd4
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052550.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
5
reference_url http://openwall.com/lists/oss-security/2010/12/16/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/16/3
6
reference_url http://openwall.com/lists/oss-security/2010/12/16/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/16/6
7
reference_url http://openwall.com/lists/oss-security/2010/12/21/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/21/3
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4352.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4352
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27521
published_at 2026-04-16T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27631
published_at 2026-04-01T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27671
published_at 2026-04-02T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27709
published_at 2026-04-04T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27499
published_at 2026-04-07T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27568
published_at 2026-04-08T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.2761
published_at 2026-04-09T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27615
published_at 2026-04-11T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27571
published_at 2026-04-12T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27514
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4352
10
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=32321
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=32321
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352
12
reference_url http://secunia.com/advisories/42580
reference_id
reference_type
scores
url http://secunia.com/advisories/42580
13
reference_url http://secunia.com/advisories/42760
reference_id
reference_type
scores
url http://secunia.com/advisories/42760
14
reference_url http://secunia.com/advisories/42911
reference_id
reference_type
scores
url http://secunia.com/advisories/42911
15
reference_url http://secunia.com/advisories/42960
reference_id
reference_type
scores
url http://secunia.com/advisories/42960
16
reference_url http://www.debian.org/security/2011/dsa-2149
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2149
17
reference_url http://www.remlab.net/op/dbus-variant-recursion.shtml
reference_id
reference_type
scores
url http://www.remlab.net/op/dbus-variant-recursion.shtml
18
reference_url http://www.securityfocus.com/bid/45377
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45377
19
reference_url http://www.ubuntu.com/usn/USN-1044-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1044-1
20
reference_url http://www.vupen.com/english/advisories/2010/3325
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3325
21
reference_url http://www.vupen.com/english/advisories/2011/0161
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0161
22
reference_url http://www.vupen.com/english/advisories/2011/0178
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0178
23
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=663673
reference_id 663673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=663673
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4352
reference_id CVE-2010-4352
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4352
27
reference_url https://security.gentoo.org/glsa/201110-14
reference_id GLSA-201110-14
reference_type
scores
url https://security.gentoo.org/glsa/201110-14
28
reference_url https://access.redhat.com/errata/RHSA-2011:0376
reference_id RHSA-2011:0376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0376
29
reference_url https://usn.ubuntu.com/1044-1/
reference_id USN-1044-1
reference_type
scores
url https://usn.ubuntu.com/1044-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.2.24-4?distro=trixie
purl pkg:deb/debian/dbus@1.2.24-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.24-4%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2010-4352
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-acpr-xua6-27cv
8
url VCID-agt1-wqw8-mbgf
vulnerability_id VCID-agt1-wqw8-mbgf
summary Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42011
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.3266
published_at 2026-04-16T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-04T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32614
published_at 2026-04-07T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32661
published_at 2026-04-08T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32687
published_at 2026-04-09T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32688
published_at 2026-04-11T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.3265
published_at 2026-04-12T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32622
published_at 2026-04-13T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33886
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.openwall.com/lists/oss-security/2022/10/06/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/
url https://www.openwall.com/lists/oss-security/2022/10/06/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133617
reference_id 2133617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133617
8
reference_url https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
reference_id 413
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/
url https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
9
reference_url https://security.archlinux.org/AVG-2805
reference_id AVG-2805
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2805
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
reference_id E4CO7N226I3X5FNBR2MACCH6TS764VJP
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
11
reference_url https://security.gentoo.org/glsa/202305-08
reference_id GLSA-202305-08
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/
url https://security.gentoo.org/glsa/202305-08
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
reference_id ND74SKN56BCYL3QLEAAB6E64UUBRA5UG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
13
reference_url https://access.redhat.com/errata/RHSA-2022:8812
reference_id RHSA-2022:8812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8812
14
reference_url https://access.redhat.com/errata/RHSA-2022:8977
reference_id RHSA-2022:8977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8977
15
reference_url https://access.redhat.com/errata/RHSA-2023:0096
reference_id RHSA-2023:0096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0096
16
reference_url https://access.redhat.com/errata/RHSA-2023:0335
reference_id RHSA-2023:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0335
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
reference_id SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T17:41:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
18
reference_url https://usn.ubuntu.com/5704-1/
reference_id USN-5704-1
reference_type
scores
url https://usn.ubuntu.com/5704-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.12.24-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.24-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.24-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.4-1?distro=trixie
purl pkg:deb/debian/dbus@1.14.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.4-1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
5
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2022-42011
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-agt1-wqw8-mbgf
9
url VCID-c46h-e78b-tqbx
vulnerability_id VCID-c46h-e78b-tqbx
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0201.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0201
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20893
published_at 2026-04-16T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20923
published_at 2026-04-01T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21073
published_at 2026-04-02T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21126
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2084
published_at 2026-04-07T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.2092
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20982
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20999
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20956
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20903
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0201
3
reference_url http://secunia.com/advisories/14119
reference_id
reference_type
scores
url http://secunia.com/advisories/14119
4
reference_url http://secunia.com/advisories/15638
reference_id
reference_type
scores
url http://secunia.com/advisories/15638
5
reference_url http://secunia.com/advisories/15833
reference_id
reference_type
scores
url http://secunia.com/advisories/15833
6
reference_url http://secunia.com/advisories/15844
reference_id
reference_type
scores
url http://secunia.com/advisories/15844
7
reference_url http://securitytracker.com/id?1013075
reference_id
reference_type
scores
url http://securitytracker.com/id?1013075
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10973
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10973
9
reference_url http://www.auscert.org.au/render.html?it=5156
reference_id
reference_type
scores
url http://www.auscert.org.au/render.html?it=5156
10
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:105
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:105
11
reference_url http://www.redhat.com/support/errata/RHSA-2005-102.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-102.html
12
reference_url http://www.securityfocus.com/bid/12435
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12435
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617489
reference_id 1617489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617489
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus:d-bus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus:d-bus:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0201
reference_id CVE-2005-0201
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-0201
16
reference_url https://access.redhat.com/errata/RHSA-2005:102
reference_id RHSA-2005:102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:102
17
reference_url https://usn.ubuntu.com/144-1/
reference_id USN-144-1
reference_type
scores
url https://usn.ubuntu.com/144-1/
fixed_packages
0
url pkg:deb/debian/dbus@0.22?distro=trixie
purl pkg:deb/debian/dbus@0.22?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@0.22%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2005-0201
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c46h-e78b-tqbx
10
url VCID-dwwp-hsmw-b3fm
vulnerability_id VCID-dwwp-hsmw-b3fm
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0395.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0395.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3637.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3637.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3637
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15834
published_at 2026-04-16T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15965
published_at 2026-04-01T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16035
published_at 2026-04-02T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16097
published_at 2026-04-04T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15889
published_at 2026-04-07T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15975
published_at 2026-04-08T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16038
published_at 2026-04-09T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16015
published_at 2026-04-11T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15976
published_at 2026-04-12T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15908
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3637
4
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=80559
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=80559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
10
reference_url http://secunia.com/advisories/61378
reference_id
reference_type
scores
url http://secunia.com/advisories/61378
11
reference_url http://www.debian.org/security/2014/dsa-3026
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3026
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
13
reference_url http://www.openwall.com/lists/oss-security/2014/09/16/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/16/9
14
reference_url http://www.openwall.com/lists/oss-security/2019/06/24/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/24/13
15
reference_url http://www.openwall.com/lists/oss-security/2019/06/24/14
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/24/14
16
reference_url http://www.securitytracker.com/id/1030864
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030864
17
reference_url http://www.ubuntu.com/usn/USN-2352-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2352-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1140527
reference_id 1140527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1140527
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3637
reference_id CVE-2014-3637
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3637
60
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
61
reference_url https://usn.ubuntu.com/2352-1/
reference_id USN-2352-1
reference_type
scores
url https://usn.ubuntu.com/2352-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.8-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.8-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3637
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwwp-hsmw-b3fm
11
url VCID-fduk-sggr-2qaw
vulnerability_id VCID-fduk-sggr-2qaw
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0294.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0294.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
2
reference_url http://openwall.com/lists/oss-security/2014/07/02/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/07/02/4
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3532.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3532.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3532
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31427
published_at 2026-04-16T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31387
published_at 2026-04-01T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31524
published_at 2026-04-02T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31567
published_at 2026-04-04T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31384
published_at 2026-04-07T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31438
published_at 2026-04-08T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31468
published_at 2026-04-09T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31472
published_at 2026-04-11T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31429
published_at 2026-04-12T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31393
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3532
5
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=80163
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=80163
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
9
reference_url http://secunia.com/advisories/59611
reference_id
reference_type
scores
url http://secunia.com/advisories/59611
10
reference_url http://secunia.com/advisories/59798
reference_id
reference_type
scores
url http://secunia.com/advisories/59798
11
reference_url http://secunia.com/advisories/60236
reference_id
reference_type
scores
url http://secunia.com/advisories/60236
12
reference_url http://www.debian.org/security/2014/dsa-2971
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2971
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1114414
reference_id 1114414
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1114414
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3532
reference_id CVE-2014-3532
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3532
30
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
31
reference_url https://usn.ubuntu.com/2275-1/
reference_id USN-2275-1
reference_type
scores
url https://usn.ubuntu.com/2275-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.6-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.6-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3532
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fduk-sggr-2qaw
12
url VCID-fh3r-yj4m-bbhs
vulnerability_id VCID-fh3r-yj4m-bbhs
summary Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42012
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43276
published_at 2026-04-16T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43239
published_at 2026-04-04T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43177
published_at 2026-04-07T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43229
published_at 2026-04-08T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43242
published_at 2026-04-09T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43263
published_at 2026-04-11T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43231
published_at 2026-04-12T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43216
published_at 2026-04-13T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.44486
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.openwall.com/lists/oss-security/2022/10/06/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/
url https://www.openwall.com/lists/oss-security/2022/10/06/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133618
reference_id 2133618
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133618
8
reference_url https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
reference_id 417
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/
url https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
9
reference_url https://security.archlinux.org/AVG-2805
reference_id AVG-2805
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2805
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
reference_id E4CO7N226I3X5FNBR2MACCH6TS764VJP
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
11
reference_url https://security.gentoo.org/glsa/202305-08
reference_id GLSA-202305-08
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/
url https://security.gentoo.org/glsa/202305-08
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
reference_id ND74SKN56BCYL3QLEAAB6E64UUBRA5UG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
13
reference_url https://access.redhat.com/errata/RHSA-2022:8812
reference_id RHSA-2022:8812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8812
14
reference_url https://access.redhat.com/errata/RHSA-2022:8977
reference_id RHSA-2022:8977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8977
15
reference_url https://access.redhat.com/errata/RHSA-2023:0096
reference_id RHSA-2023:0096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0096
16
reference_url https://access.redhat.com/errata/RHSA-2023:0335
reference_id RHSA-2023:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0335
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
reference_id SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T22:37:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
18
reference_url https://usn.ubuntu.com/5704-1/
reference_id USN-5704-1
reference_type
scores
url https://usn.ubuntu.com/5704-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.12.24-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.24-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.24-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.4-1?distro=trixie
purl pkg:deb/debian/dbus@1.14.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.4-1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
5
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2022-42012
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3r-yj4m-bbhs
13
url VCID-fru7-rpdb-5fft
vulnerability_id VCID-fru7-rpdb-5fft
summary Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42010
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21507
published_at 2026-04-16T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21703
published_at 2026-04-04T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21457
published_at 2026-04-07T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21534
published_at 2026-04-08T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21592
published_at 2026-04-09T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21605
published_at 2026-04-11T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21567
published_at 2026-04-12T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.2151
published_at 2026-04-13T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22447
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.openwall.com/lists/oss-security/2022/10/06/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/
url https://www.openwall.com/lists/oss-security/2022/10/06/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133616
reference_id 2133616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133616
8
reference_url https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
reference_id 418
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/
url https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
9
reference_url https://security.archlinux.org/AVG-2805
reference_id AVG-2805
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2805
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
reference_id E4CO7N226I3X5FNBR2MACCH6TS764VJP
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
11
reference_url https://security.gentoo.org/glsa/202305-08
reference_id GLSA-202305-08
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/
url https://security.gentoo.org/glsa/202305-08
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
reference_id ND74SKN56BCYL3QLEAAB6E64UUBRA5UG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
13
reference_url https://access.redhat.com/errata/RHSA-2022:8812
reference_id RHSA-2022:8812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8812
14
reference_url https://access.redhat.com/errata/RHSA-2022:8977
reference_id RHSA-2022:8977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8977
15
reference_url https://access.redhat.com/errata/RHSA-2023:0096
reference_id RHSA-2023:0096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0096
16
reference_url https://access.redhat.com/errata/RHSA-2023:0335
reference_id RHSA-2023:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0335
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
reference_id SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-02T21:14:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
18
reference_url https://usn.ubuntu.com/5704-1/
reference_id USN-5704-1
reference_type
scores
url https://usn.ubuntu.com/5704-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.12.24-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.24-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.24-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.4-1?distro=trixie
purl pkg:deb/debian/dbus@1.14.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.4-1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
5
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2022-42010
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fru7-rpdb-5fft
14
url VCID-j7hb-4ppz-p3hp
vulnerability_id VCID-j7hb-4ppz-p3hp
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0266.html
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://advisories.mageia.org/MGASA-2014-0266.html
1
reference_url http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3477.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3477
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24586
published_at 2026-04-16T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24764
published_at 2026-04-04T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24537
published_at 2026-04-07T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24608
published_at 2026-04-08T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24655
published_at 2026-04-09T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24671
published_at 2026-04-11T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24631
published_at 2026-04-12T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24574
published_at 2026-04-13T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26844
published_at 2026-04-02T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26801
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3477
7
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=78979
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url https://bugs.freedesktop.org/show_bug.cgi?id=78979
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
11
reference_url http://seclists.org/oss-sec/2014/q2/509
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://seclists.org/oss-sec/2014/q2/509
12
reference_url http://secunia.com/advisories/59428
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://secunia.com/advisories/59428
13
reference_url http://secunia.com/advisories/59611
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://secunia.com/advisories/59611
14
reference_url http://secunia.com/advisories/59798
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://secunia.com/advisories/59798
15
reference_url http://www.debian.org/security/2014/dsa-2971
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://www.debian.org/security/2014/dsa-2971
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
17
reference_url http://www.securityfocus.com/bid/67986
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:11:29Z/
url http://www.securityfocus.com/bid/67986
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1104791
reference_id 1104791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1104791
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.28:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.30:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3477
reference_id CVE-2014-3477
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2014-3477
67
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
68
reference_url https://usn.ubuntu.com/2275-1/
reference_id USN-2275-1
reference_type
scores
url https://usn.ubuntu.com/2275-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.4-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3477
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7hb-4ppz-p3hp
15
url VCID-jpgs-a4kn-auc6
vulnerability_id VCID-jpgs-a4kn-auc6
summary dbus security policy circumvention
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0595.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0595
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.1964
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19778
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19831
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19632
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19685
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.1969
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19641
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19582
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=432419
reference_id 432419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=432419
4
reference_url https://access.redhat.com/errata/RHSA-2008:0159
reference_id RHSA-2008:0159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0159
5
reference_url https://usn.ubuntu.com/653-1/
reference_id USN-653-1
reference_type
scores
url https://usn.ubuntu.com/653-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.1.20-1?distro=trixie
purl pkg:deb/debian/dbus@1.1.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.1.20-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2008-0595
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jpgs-a4kn-auc6
16
url VCID-jz2n-vp61-nyh2
vulnerability_id VCID-jz2n-vp61-nyh2
summary
Multiple vulnerabilities were found in D-Bus, the worst of which
    allowing for a symlink attack.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2200.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2200.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2200
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27015
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27055
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27091
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.2688
published_at 2026-04-07T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26948
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26994
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26998
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26953
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26895
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26906
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2200
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2200
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938
reference_id 629938
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=712676
reference_id 712676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=712676
5
reference_url https://security.gentoo.org/glsa/201110-14
reference_id GLSA-201110-14
reference_type
scores
url https://security.gentoo.org/glsa/201110-14
6
reference_url https://access.redhat.com/errata/RHSA-2011:1132
reference_id RHSA-2011:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1132
7
reference_url https://usn.ubuntu.com/1176-1/
reference_id USN-1176-1
reference_type
scores
url https://usn.ubuntu.com/1176-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.4.12-1?distro=trixie
purl pkg:deb/debian/dbus@1.4.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.4.12-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2011-2200
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz2n-vp61-nyh2
17
url VCID-jz46-dun9-h7a1
vulnerability_id VCID-jz46-dun9-h7a1
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0395.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://advisories.mageia.org/MGASA-2014-0395.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3636.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3636.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3636
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26721
published_at 2026-04-01T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26767
published_at 2026-04-02T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26808
published_at 2026-04-04T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26591
published_at 2026-04-07T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-08T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-09T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-11T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26669
published_at 2026-04-12T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26611
published_at 2026-04-13T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3636
4
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=82820
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url https://bugs.freedesktop.org/show_bug.cgi?id=82820
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
10
reference_url http://secunia.com/advisories/61378
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://secunia.com/advisories/61378
11
reference_url http://www.debian.org/security/2014/dsa-3026
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://www.debian.org/security/2014/dsa-3026
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
13
reference_url http://www.openwall.com/lists/oss-security/2014/09/16/9
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://www.openwall.com/lists/oss-security/2014/09/16/9
14
reference_url http://www.securitytracker.com/id/1030864
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://www.securitytracker.com/id/1030864
15
reference_url http://www.ubuntu.com/usn/USN-2352-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:04:09Z/
url http://www.ubuntu.com/usn/USN-2352-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1140525
reference_id 1140525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1140525
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3636
reference_id CVE-2014-3636
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3636
24
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
25
reference_url https://usn.ubuntu.com/2352-1/
reference_id USN-2352-1
reference_type
scores
url https://usn.ubuntu.com/2352-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.8-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.8-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3636
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz46-dun9-h7a1
18
url VCID-m1tk-vryk-pfbu
vulnerability_id VCID-m1tk-vryk-pfbu
summary dbus: users with the same numeric UID could lead to use-after-free and undefined behaviour
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35512.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35512
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09686
published_at 2026-04-01T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09671
published_at 2026-04-16T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09703
published_at 2026-04-07T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09774
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09826
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09836
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09804
published_at 2026-04-12T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09787
published_at 2026-04-13T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09755
published_at 2026-04-02T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09806
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35512
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1909101
reference_id 1909101
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1909101
5
reference_url https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
reference_id 305#note_829128
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/
url https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
6
reference_url https://bugs.gentoo.org/755392
reference_id 755392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/
url https://bugs.gentoo.org/755392
7
reference_url https://security.archlinux.org/AVG-1573
reference_id AVG-1573
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1573
8
reference_url https://security-tracker.debian.org/tracker/CVE-2020-35512
reference_id CVE-2020-35512
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T15:31:25Z/
url https://security-tracker.debian.org/tracker/CVE-2020-35512
9
reference_url https://usn.ubuntu.com/5244-1/
reference_id USN-5244-1
reference_type
scores
url https://usn.ubuntu.com/5244-1/
10
reference_url https://usn.ubuntu.com/5244-2/
reference_id USN-5244-2
reference_type
scores
url https://usn.ubuntu.com/5244-2/
fixed_packages
0
url pkg:deb/debian/dbus@1.12.20-1?distro=trixie
purl pkg:deb/debian/dbus@1.12.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.20-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2020-35512
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1tk-vryk-pfbu
19
url VCID-m65e-8xzj-tuh1
vulnerability_id VCID-m65e-8xzj-tuh1
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0395.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0395.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3639.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3639.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3639
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27789
published_at 2026-04-16T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27879
published_at 2026-04-01T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27934
published_at 2026-04-02T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27976
published_at 2026-04-04T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27768
published_at 2026-04-07T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27835
published_at 2026-04-08T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27877
published_at 2026-04-09T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27883
published_at 2026-04-11T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.2784
published_at 2026-04-12T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27782
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3639
5
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=80919
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=80919
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
11
reference_url http://secunia.com/advisories/61378
reference_id
reference_type
scores
url http://secunia.com/advisories/61378
12
reference_url http://secunia.com/advisories/61431
reference_id
reference_type
scores
url http://secunia.com/advisories/61431
13
reference_url http://www.debian.org/security/2014/dsa-3026
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3026
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
15
reference_url http://www.openwall.com/lists/oss-security/2014/09/16/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/16/9
16
reference_url http://www.securitytracker.com/id/1030864
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030864
17
reference_url http://www.ubuntu.com/usn/USN-2352-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2352-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1140532
reference_id 1140532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1140532
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3639
reference_id CVE-2014-3639
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3639
37
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
38
reference_url https://usn.ubuntu.com/2352-1/
reference_id USN-2352-1
reference_type
scores
url https://usn.ubuntu.com/2352-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.8-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.8-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3639
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m65e-8xzj-tuh1
20
url VCID-mjps-b9wy-wkgq
vulnerability_id VCID-mjps-b9wy-wkgq
summary An authentication bypass was discovered in D-Bus.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12749
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07546
published_at 2026-04-16T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.0744
published_at 2026-04-01T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07555
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07597
published_at 2026-04-04T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07572
published_at 2026-04-07T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07631
published_at 2026-04-08T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07648
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07635
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.0762
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.securityfocus.com/bid/108751
reference_id 108751
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url http://www.securityfocus.com/bid/108751
5
reference_url https://seclists.org/bugtraq/2019/Jun/16
reference_id 16
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://seclists.org/bugtraq/2019/Jun/16
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1719344
reference_id 1719344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1719344
7
reference_url https://www.openwall.com/lists/oss-security/2019/06/11/2
reference_id 2
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://www.openwall.com/lists/oss-security/2019/06/11/2
8
reference_url http://www.openwall.com/lists/oss-security/2019/06/11/2
reference_id 2
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url http://www.openwall.com/lists/oss-security/2019/06/11/2
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375
reference_id 930375
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375
10
reference_url https://security.archlinux.org/ASA-201906-16
reference_id ASA-201906-16
reference_type
scores
url https://security.archlinux.org/ASA-201906-16
11
reference_url https://security.archlinux.org/AVG-974
reference_id AVG-974
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-974
12
reference_url https://www.debian.org/security/2019/dsa-4462
reference_id dsa-4462
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://www.debian.org/security/2019/dsa-4462
13
reference_url https://security.gentoo.org/glsa/201909-08
reference_id GLSA-201909-08
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://security.gentoo.org/glsa/201909-08
14
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
15
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
reference_id msg00059.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
reference_id msg00092.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
18
reference_url https://access.redhat.com/errata/RHSA-2019:1726
reference_id RHSA-2019:1726
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://access.redhat.com/errata/RHSA-2019:1726
19
reference_url https://access.redhat.com/errata/RHSA-2019:2868
reference_id RHSA-2019:2868
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://access.redhat.com/errata/RHSA-2019:2868
20
reference_url https://access.redhat.com/errata/RHSA-2019:2870
reference_id RHSA-2019:2870
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://access.redhat.com/errata/RHSA-2019:2870
21
reference_url https://access.redhat.com/errata/RHSA-2019:3707
reference_id RHSA-2019:3707
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://access.redhat.com/errata/RHSA-2019:3707
22
reference_url https://access.redhat.com/errata/RHSA-2020:4032
reference_id RHSA-2020:4032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4032
23
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
24
reference_url https://usn.ubuntu.com/4015-1/
reference_id USN-4015-1
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://usn.ubuntu.com/4015-1/
25
reference_url https://usn.ubuntu.com/4015-2/
reference_id USN-4015-2
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://usn.ubuntu.com/4015-2/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
reference_id V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
fixed_packages
0
url pkg:deb/debian/dbus@1.12.16-1?distro=trixie
purl pkg:deb/debian/dbus@1.12.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.16-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2019-12749
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjps-b9wy-wkgq
21
url VCID-mn9w-cnut-17d4
vulnerability_id VCID-mn9w-cnut-17d4
summary
A vulnerability has been found in D-Bus, possibly resulting in
    local Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0245.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0245.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0245
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25888
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25952
published_at 2026-04-02T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25994
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25764
published_at 2026-04-07T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25834
published_at 2026-04-08T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25886
published_at 2026-04-09T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25897
published_at 2026-04-11T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25854
published_at 2026-04-12T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25797
published_at 2026-04-13T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.258
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0245
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1186775
reference_id 1186775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1186775
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777545
reference_id 777545
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777545
5
reference_url https://security.gentoo.org/glsa/201503-02
reference_id GLSA-201503-02
reference_type
scores
url https://security.gentoo.org/glsa/201503-02
6
reference_url https://usn.ubuntu.com/3116-1/
reference_id USN-3116-1
reference_type
scores
url https://usn.ubuntu.com/3116-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.16-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.16-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2015-0245
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mn9w-cnut-17d4
22
url VCID-nw3v-9jph-qkfx
vulnerability_id VCID-nw3v-9jph-qkfx
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0457.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0457.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7824.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7824.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7824
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26034
published_at 2026-04-16T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26114
published_at 2026-04-01T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26195
published_at 2026-04-02T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26236
published_at 2026-04-04T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26008
published_at 2026-04-07T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26074
published_at 2026-04-08T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26126
published_at 2026-04-09T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26135
published_at 2026-04-11T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.2609
published_at 2026-04-12T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26031
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7824
3
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=85105
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=85105
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824
5
reference_url http://secunia.com/advisories/62603
reference_id
reference_type
scores
url http://secunia.com/advisories/62603
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/98576
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/98576
7
reference_url http://www.debian.org/security/2014/dsa-3099
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3099
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
9
reference_url http://www.openwall.com/lists/oss-security/2014/11/10/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/11/10/2
10
reference_url http://www.securityfocus.com/bid/71012
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71012
11
reference_url http://www.ubuntu.com/usn/USN-2425-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2425-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1173555
reference_id 1173555
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1173555
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.24:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.9.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7824
reference_id CVE-2014-7824
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-7824
40
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
41
reference_url https://usn.ubuntu.com/2425-1/
reference_id USN-2425-1
reference_type
scores
url https://usn.ubuntu.com/2425-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.10-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.10-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-7824
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw3v-9jph-qkfx
23
url VCID-s4xn-z1py-9bbs
vulnerability_id VCID-s4xn-z1py-9bbs
summary
A vulnerability has been found in D-Bus which allows local
    attackers to gain escalated privileges.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1261.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1261.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3524.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3524.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3524
reference_id
reference_type
scores
0
value 0.52378
scoring_system epss
scoring_elements 0.97936
published_at 2026-04-16T12:55:00Z
1
value 0.52378
scoring_system epss
scoring_elements 0.97907
published_at 2026-04-01T12:55:00Z
2
value 0.52378
scoring_system epss
scoring_elements 0.97912
published_at 2026-04-02T12:55:00Z
3
value 0.52378
scoring_system epss
scoring_elements 0.97914
published_at 2026-04-04T12:55:00Z
4
value 0.52378
scoring_system epss
scoring_elements 0.97917
published_at 2026-04-07T12:55:00Z
5
value 0.52378
scoring_system epss
scoring_elements 0.97922
published_at 2026-04-08T12:55:00Z
6
value 0.52378
scoring_system epss
scoring_elements 0.97924
published_at 2026-04-09T12:55:00Z
7
value 0.52378
scoring_system epss
scoring_elements 0.97927
published_at 2026-04-11T12:55:00Z
8
value 0.52378
scoring_system epss
scoring_elements 0.97928
published_at 2026-04-12T12:55:00Z
9
value 0.52378
scoring_system epss
scoring_elements 0.9793
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3524
7
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=52202
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=52202
8
reference_url https://bugzilla.novell.com/show_bug.cgi?id=697105
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=697105
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524
10
reference_url http://secunia.com/advisories/50537
reference_id
reference_type
scores
url http://secunia.com/advisories/50537
11
reference_url http://secunia.com/advisories/50544
reference_id
reference_type
scores
url http://secunia.com/advisories/50544
12
reference_url http://secunia.com/advisories/50710
reference_id
reference_type
scores
url http://secunia.com/advisories/50710
13
reference_url http://stealth.openwall.net/null/dzug.c
reference_id
reference_type
scores
url http://stealth.openwall.net/null/dzug.c
14
reference_url http://www.exploit-db.com/exploits/21323
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/21323
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:070
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:070
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:083
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:083
17
reference_url http://www.openwall.com/lists/oss-security/2012/07/10/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/07/10/4
18
reference_url http://www.openwall.com/lists/oss-security/2012/07/26/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/07/26/1
19
reference_url http://www.openwall.com/lists/oss-security/2012/09/12/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/12/6
20
reference_url http://www.openwall.com/lists/oss-security/2012/09/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/14/2
21
reference_url http://www.openwall.com/lists/oss-security/2012/09/17/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/17/2
22
reference_url http://www.securityfocus.com/bid/55517
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55517
23
reference_url http://www.ubuntu.com/usn/USN-1576-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1576-1
24
reference_url http://www.ubuntu.com/usn/USN-1576-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1576-2
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689070
reference_id 689070
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689070
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=847402
reference_id 847402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=847402
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3524
reference_id CVE-2012-3524
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3524
35
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21323.c
reference_id CVE-2012-3524;OSVDB-85480;CVE-2012-4425
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21323.c
36
reference_url https://security.gentoo.org/glsa/201406-01
reference_id GLSA-201406-01
reference_type
scores
url https://security.gentoo.org/glsa/201406-01
37
reference_url https://access.redhat.com/errata/RHSA-2012:1261
reference_id RHSA-2012:1261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1261
38
reference_url https://usn.ubuntu.com/1576-1/
reference_id USN-1576-1
reference_type
scores
url https://usn.ubuntu.com/1576-1/
39
reference_url https://usn.ubuntu.com/1576-2/
reference_id USN-1576-2
reference_type
scores
url https://usn.ubuntu.com/1576-2/
fixed_packages
0
url pkg:deb/debian/dbus@1.6.8-1?distro=trixie
purl pkg:deb/debian/dbus@1.6.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.6.8-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2012-3524
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4xn-z1py-9bbs
24
url VCID-sw3b-9qzk-nqge
vulnerability_id VCID-sw3b-9qzk-nqge
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0395.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0395.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3635.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3635.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3635
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38708
published_at 2026-04-16T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38573
published_at 2026-04-01T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38703
published_at 2026-04-02T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38725
published_at 2026-04-11T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38654
published_at 2026-04-07T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38705
published_at 2026-04-08T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38715
published_at 2026-04-09T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38688
published_at 2026-04-12T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38661
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3635
4
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=83622
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=83622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
10
reference_url http://secunia.com/advisories/61378
reference_id
reference_type
scores
url http://secunia.com/advisories/61378
11
reference_url http://www.debian.org/security/2014/dsa-3026
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3026
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
13
reference_url http://www.openwall.com/lists/oss-security/2014/09/16/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/16/9
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
15
reference_url http://www.securitytracker.com/id/1030864
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030864
16
reference_url http://www.ubuntu.com/usn/USN-2352-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2352-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1140523
reference_id 1140523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1140523
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3635
reference_id CVE-2014-3635
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3635
36
reference_url https://security.gentoo.org/glsa/201412-12
reference_id GLSA-201412-12
reference_type
scores
url https://security.gentoo.org/glsa/201412-12
37
reference_url https://usn.ubuntu.com/2352-1/
reference_id USN-2352-1
reference_type
scores
url https://usn.ubuntu.com/2352-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.8.8-1?distro=trixie
purl pkg:deb/debian/dbus@1.8.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.8.8-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2014-3635
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sw3b-9qzk-nqge
25
url VCID-u1a5-18hy-nqfa
vulnerability_id VCID-u1a5-18hy-nqfa
summary dbus: invalid fix for CVE-2008-3834
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1189.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1189
reference_id
reference_type
scores
0
value 0.01106
scoring_system epss
scoring_elements 0.78042
published_at 2026-04-01T12:55:00Z
1
value 0.01106
scoring_system epss
scoring_elements 0.7805
published_at 2026-04-02T12:55:00Z
2
value 0.01106
scoring_system epss
scoring_elements 0.78079
published_at 2026-04-04T12:55:00Z
3
value 0.01106
scoring_system epss
scoring_elements 0.78062
published_at 2026-04-07T12:55:00Z
4
value 0.01106
scoring_system epss
scoring_elements 0.78088
published_at 2026-04-08T12:55:00Z
5
value 0.01106
scoring_system epss
scoring_elements 0.78092
published_at 2026-04-09T12:55:00Z
6
value 0.01106
scoring_system epss
scoring_elements 0.78118
published_at 2026-04-11T12:55:00Z
7
value 0.01106
scoring_system epss
scoring_elements 0.78101
published_at 2026-04-12T12:55:00Z
8
value 0.01106
scoring_system epss
scoring_elements 0.78097
published_at 2026-04-13T12:55:00Z
9
value 0.01106
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1189
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496672
reference_id 496672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496672
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532720
reference_id 532720
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532720
5
reference_url https://access.redhat.com/errata/RHSA-2010:0018
reference_id RHSA-2010:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0018
6
reference_url https://usn.ubuntu.com/799-1/
reference_id USN-799-1
reference_type
scores
url https://usn.ubuntu.com/799-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.2.14-1?distro=trixie
purl pkg:deb/debian/dbus@1.2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.14-1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2009-1189
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1a5-18hy-nqfa
26
url VCID-vk1a-p2pv-67gy
vulnerability_id VCID-vk1a-p2pv-67gy
summary dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34969.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34969
reference_id
reference_type
scores
0
value 0.00629
scoring_system epss
scoring_elements 0.702
published_at 2026-04-02T12:55:00Z
1
value 0.0067
scoring_system epss
scoring_elements 0.71378
published_at 2026-04-16T12:55:00Z
2
value 0.0067
scoring_system epss
scoring_elements 0.71312
published_at 2026-04-04T12:55:00Z
3
value 0.0067
scoring_system epss
scoring_elements 0.71287
published_at 2026-04-07T12:55:00Z
4
value 0.0067
scoring_system epss
scoring_elements 0.71328
published_at 2026-04-08T12:55:00Z
5
value 0.0067
scoring_system epss
scoring_elements 0.71342
published_at 2026-04-09T12:55:00Z
6
value 0.0067
scoring_system epss
scoring_elements 0.71364
published_at 2026-04-11T12:55:00Z
7
value 0.0067
scoring_system epss
scoring_elements 0.71349
published_at 2026-04-12T12:55:00Z
8
value 0.0067
scoring_system epss
scoring_elements 0.71332
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037151
reference_id 1037151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037151
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213166
reference_id 2213166
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213166
6
reference_url https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
reference_id 457
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/
url https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
reference_id BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
8
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
reference_id msg00033.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
9
reference_url https://security.netapp.com/advisory/ntap-20231208-0007/
reference_id ntap-20231208-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T19:00:29Z/
url https://security.netapp.com/advisory/ntap-20231208-0007/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4498
reference_id RHSA-2023:4498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4498
11
reference_url https://access.redhat.com/errata/RHSA-2023:4569
reference_id RHSA-2023:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4569
12
reference_url https://access.redhat.com/errata/RHSA-2023:5193
reference_id RHSA-2023:5193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5193
13
reference_url https://usn.ubuntu.com/6372-1/
reference_id USN-6372-1
reference_type
scores
url https://usn.ubuntu.com/6372-1/
fixed_packages
0
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.14.8-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.8-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.8-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.8-1?distro=trixie
purl pkg:deb/debian/dbus@1.14.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.8-1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
5
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2023-34969
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vk1a-p2pv-67gy
27
url VCID-zzrk-cm9s-cfhd
vulnerability_id VCID-zzrk-cm9s-cfhd
summary dbus: incorrect use of [send|receive]_requested_reply policy rule attribute in system.conf
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503532
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503532
1
reference_url http://forums.fedoraforum.org/showthread.php?t=206797
reference_id
reference_type
scores
url http://forums.fedoraforum.org/showthread.php?t=206797
2
reference_url http://lists.freedesktop.org/archives/dbus/2008-December/010702.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/dbus/2008-December/010702.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4311.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4311
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.0964
published_at 2026-04-16T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09771
published_at 2026-04-12T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09754
published_at 2026-04-13T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13366
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.1341
published_at 2026-04-01T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13497
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.1347
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13447
published_at 2026-04-08T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13509
published_at 2026-04-02T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13571
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4311
9
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=18229
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=18229
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=474895
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=474895
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311
12
reference_url http://secunia.com/advisories/33047
reference_id
reference_type
scores
url http://secunia.com/advisories/33047
13
reference_url http://secunia.com/advisories/33055
reference_id
reference_type
scores
url http://secunia.com/advisories/33055
14
reference_url http://secunia.com/advisories/34360
reference_id
reference_type
scores
url http://secunia.com/advisories/34360
15
reference_url http://secunia.com/advisories/34642
reference_id
reference_type
scores
url http://secunia.com/advisories/34642
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47138
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47138
17
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00436.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00436.html
18
reference_url http://www.securityfocus.com/bid/32674
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32674
19
reference_url http://www.vupen.com/english/advisories/2008/3355
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3355
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=469151
reference_id 469151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=469151
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508032
reference_id 508032
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508032
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.60:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc1:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc2:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.0:rc3:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:dbus:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.1.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4311
reference_id CVE-2008-4311
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4311
fixed_packages
0
url pkg:deb/debian/dbus@1.2.1-5?distro=trixie
purl pkg:deb/debian/dbus@1.2.1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.2.1-5%3Fdistro=trixie
1
url pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dbus@1.12.28-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.12.28-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
purl pkg:deb/debian/dbus@1.14.10-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.14.10-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/dbus@1.16.2-2?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie
4
url pkg:deb/debian/dbus@1.16.2-4?distro=trixie
purl pkg:deb/debian/dbus@1.16.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-4%3Fdistro=trixie
aliases CVE-2008-4311
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zzrk-cm9s-cfhd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/dbus@1.16.2-2%3Fdistro=trixie