Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1038399?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1038399?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.2-3", "type": "deb", "namespace": "debian", "name": "libx11", "version": "2:1.6.2-3", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2:1.7.2-1+deb11u2", "latest_non_vulnerable_version": "2:1.7.2-1+deb11u2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41702?format=api", "vulnerability_id": "VCID-16w3-mvk5-8bfg", "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n worst of which could allow for remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91599", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91636", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93458", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93427", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93428", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93447", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93452", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242", "reference_id": "1623242", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242" }, { "reference_url": "https://security.gentoo.org/glsa/201811-01", "reference_id": "GLSA-201811-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079", "reference_id": "RHSA-2019:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2079" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2" } ], "aliases": [ "CVE-2018-14600" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-16w3-mvk5-8bfg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47741?format=api", "vulnerability_id": "VCID-22vh-wnqm-qqh5", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.8894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88964", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.8899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89002", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89007", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89003", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861", "reference_id": "1381861", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439", "reference_id": "840439", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038401?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-16w3-mvk5-8bfg" }, { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-enay-5y1j-ffa4" }, { "vulnerability": "VCID-npqc-cahn-cfgk" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1" } ], "aliases": [ "CVE-2016-7943" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37952?format=api", "vulnerability_id": "VCID-941j-gajx-1qc9", "summary": "A vulnerability in X.Org X11 library could lead to a Denial of\n Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83844", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83938", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83857", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83873", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83905", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83915", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822", "reference_id": "1961822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737", "reference_id": "988737", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737" }, { "reference_url": "https://security.archlinux.org/ASA-202105-12", "reference_id": "ASA-202105-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-12" }, { "reference_url": "https://security.archlinux.org/AVG-1968", "reference_id": "AVG-1968", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1968" }, { "reference_url": "https://security.gentoo.org/glsa/202105-16", "reference_id": "GLSA-202105-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3296", "reference_id": "RHSA-2021:3296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3477", "reference_id": "RHSA-2021:3477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4326", "reference_id": "RHSA-2021:4326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4326" }, { "reference_url": "https://usn.ubuntu.com/4966-1/", "reference_id": "USN-4966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4966-1/" }, { "reference_url": "https://usn.ubuntu.com/4966-2/", "reference_id": "USN-4966-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4966-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2" } ], "aliases": [ "CVE-2021-31535" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-941j-gajx-1qc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58827?format=api", "vulnerability_id": "VCID-byet-4t52-1kf5", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27561", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27774", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27616", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27675", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252", "reference_id": "2242252", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43785", "reference_id": "CVE-2023-43785", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-43785" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145", "reference_id": "RHSA-2024:2145", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973", "reference_id": "RHSA-2024:2973", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2973" }, { "reference_url": "https://usn.ubuntu.com/6407-1/", "reference_id": "USN-6407-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-1/" }, { "reference_url": "https://usn.ubuntu.com/6407-2/", "reference_id": "USN-6407-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2" } ], "aliases": [ "CVE-2023-43785" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byet-4t52-1kf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58828?format=api", "vulnerability_id": "VCID-e89b-946w-g7fp", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24414", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24594", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2444", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24499", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24455", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253", "reference_id": "2242253", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43786", "reference_id": "CVE-2023-43786", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-43786" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145", "reference_id": "RHSA-2024:2145", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973", "reference_id": "RHSA-2024:2973", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2973" }, { "reference_url": "https://usn.ubuntu.com/6407-1/", "reference_id": "USN-6407-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-1/" }, { "reference_url": "https://usn.ubuntu.com/6407-2/", "reference_id": "USN-6407-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-2/" }, { "reference_url": "https://usn.ubuntu.com/6408-1/", "reference_id": "USN-6408-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-1/" }, { "reference_url": "https://usn.ubuntu.com/6408-2/", "reference_id": "USN-6408-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2" } ], "aliases": [ "CVE-2023-43786" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e89b-946w-g7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41701?format=api", "vulnerability_id": "VCID-enay-5y1j-ffa4", "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n worst of which could allow for remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82256", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.8231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82508", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82473", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82468", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82504", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250", "reference_id": "1623250", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250" }, { "reference_url": "https://security.gentoo.org/glsa/201811-01", "reference_id": "GLSA-201811-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079", "reference_id": "RHSA-2019:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2079" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2" } ], "aliases": [ "CVE-2018-14599" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-enay-5y1j-ffa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47736?format=api", "vulnerability_id": "VCID-ngsj-tzms-97e8", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89348", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.8935", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89367", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89388", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89385", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859", "reference_id": "1381859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439", "reference_id": "840439", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038401?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-16w3-mvk5-8bfg" }, { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-enay-5y1j-ffa4" }, { "vulnerability": "VCID-npqc-cahn-cfgk" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1" } ], "aliases": [ "CVE-2016-7942" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41700?format=api", "vulnerability_id": "VCID-npqc-cahn-cfgk", "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n worst of which could allow for remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78032", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.7807", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78053", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78079", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86664", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86677", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238", "reference_id": "1623238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238" }, { "reference_url": "https://security.gentoo.org/glsa/201811-01", "reference_id": "GLSA-201811-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079", "reference_id": "RHSA-2019:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2079" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2" } ], "aliases": [ "CVE-2018-14598" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npqc-cahn-cfgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58829?format=api", "vulnerability_id": "VCID-r53t-w3cp-4kbm", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12695", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12575", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12852", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12657", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12756", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12717", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254", "reference_id": "2242254", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43787", "reference_id": "CVE-2023-43787", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-43787" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145", "reference_id": "RHSA-2024:2145", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973", "reference_id": "RHSA-2024:2973", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2973" }, { "reference_url": "https://usn.ubuntu.com/6407-1/", "reference_id": "USN-6407-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-1/" }, { "reference_url": "https://usn.ubuntu.com/6407-2/", "reference_id": "USN-6407-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-2/" }, { "reference_url": "https://usn.ubuntu.com/6408-1/", "reference_id": "USN-6408-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-1/" }, { "reference_url": "https://usn.ubuntu.com/6408-2/", "reference_id": "USN-6408-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2" } ], "aliases": [ "CVE-2023-43787" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r53t-w3cp-4kbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58826?format=api", "vulnerability_id": "VCID-sujt-svg4-kbfp", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24061", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23883", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23913", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23922", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23893", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133", "reference_id": "1038133", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748", "reference_id": "2213748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6497", "reference_id": "RHSA-2023:6497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7029", "reference_id": "RHSA-2023:7029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1088", "reference_id": "RHSA-2024:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1417", "reference_id": "RHSA-2024:1417", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1417" }, { "reference_url": "https://usn.ubuntu.com/6168-1/", "reference_id": "USN-6168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6168-1/" }, { "reference_url": "https://usn.ubuntu.com/6168-2/", "reference_id": "USN-6168-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6168-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2" } ], "aliases": [ "CVE-2023-3138" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sujt-svg4-kbfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59404?format=api", "vulnerability_id": "VCID-tmju-y3w5-z3es", "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35381", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473", "reference_id": "1872473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008", "reference_id": "969008", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008" }, { "reference_url": "https://security.gentoo.org/glsa/202008-18", "reference_id": "GLSA-202008-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4908", "reference_id": "RHSA-2020:4908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4946", "reference_id": "RHSA-2020:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804", "reference_id": "RHSA-2021:1804", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1804" }, { "reference_url": "https://usn.ubuntu.com/4487-1/", "reference_id": "USN-4487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-1/" }, { "reference_url": "https://usn.ubuntu.com/4487-2/", "reference_id": "USN-4487-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2" } ], "aliases": [ "CVE-2020-14363" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59403?format=api", "vulnerability_id": "VCID-tsyg-kprr-67ck", "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3701", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37029", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37104", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37087", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37186", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37215", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37097", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37109", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3712", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37086", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37058", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255", "reference_id": "1862255", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255" }, { "reference_url": "https://security.archlinux.org/AVG-1212", "reference_id": "AVG-1212", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1212" }, { "reference_url": "https://security.gentoo.org/glsa/202008-18", "reference_id": "GLSA-202008-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804", "reference_id": "RHSA-2021:1804", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1804" }, { "reference_url": "https://usn.ubuntu.com/4487-1/", "reference_id": "USN-4487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-1/" }, { "reference_url": "https://usn.ubuntu.com/4487-2/", "reference_id": "USN-4487-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2" } ], "aliases": [ "CVE-2020-14344" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55988?format=api", "vulnerability_id": "VCID-e19k-nptv-ffgr", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83061", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.8309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83132", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83128", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83166", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83169", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943", "reference_id": "1209943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/2568-1/", "reference_id": "USN-2568-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2568-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571227?format=api", "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-16w3-mvk5-8bfg" }, { "vulnerability": "VCID-22vh-wnqm-qqh5" }, { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e19k-nptv-ffgr" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-enay-5y1j-ffa4" }, { "vulnerability": "VCID-ngsj-tzms-97e8" }, { "vulnerability": "VCID-npqc-cahn-cfgk" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038399?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-16w3-mvk5-8bfg" }, { "vulnerability": "VCID-22vh-wnqm-qqh5" }, { "vulnerability": "VCID-941j-gajx-1qc9" }, { "vulnerability": "VCID-byet-4t52-1kf5" }, { "vulnerability": "VCID-e89b-946w-g7fp" }, { "vulnerability": "VCID-enay-5y1j-ffa4" }, { "vulnerability": "VCID-ngsj-tzms-97e8" }, { "vulnerability": "VCID-npqc-cahn-cfgk" }, { "vulnerability": "VCID-r53t-w3cp-4kbm" }, { "vulnerability": "VCID-sujt-svg4-kbfp" }, { "vulnerability": "VCID-tmju-y3w5-z3es" }, { "vulnerability": "VCID-tsyg-kprr-67ck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3" } ], "aliases": [ "CVE-2013-7439" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3" }