Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
Typedeb
Namespacedebian
Namelibx11
Version2:1.5.0-1+deb7u2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:1.7.2-1+deb11u2
Latest_non_vulnerable_version2:1.7.2-1+deb11u2
Affected_by_vulnerabilities
0
url VCID-16w3-mvk5-8bfg
vulnerability_id VCID-16w3-mvk5-8bfg
summary
Multiple vulnerabilities have been found in X.Org X11 library, the
    worst of which could allow for remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14600
reference_id
reference_type
scores
0
value 0.07254
scoring_system epss
scoring_elements 0.91592
published_at 2026-04-01T12:55:00Z
1
value 0.07254
scoring_system epss
scoring_elements 0.91599
published_at 2026-04-02T12:55:00Z
2
value 0.07254
scoring_system epss
scoring_elements 0.91605
published_at 2026-04-04T12:55:00Z
3
value 0.07254
scoring_system epss
scoring_elements 0.91613
published_at 2026-04-07T12:55:00Z
4
value 0.07254
scoring_system epss
scoring_elements 0.91626
published_at 2026-04-08T12:55:00Z
5
value 0.07254
scoring_system epss
scoring_elements 0.91632
published_at 2026-04-09T12:55:00Z
6
value 0.07254
scoring_system epss
scoring_elements 0.91636
published_at 2026-04-11T12:55:00Z
7
value 0.11007
scoring_system epss
scoring_elements 0.93458
published_at 2026-04-21T12:55:00Z
8
value 0.11007
scoring_system epss
scoring_elements 0.93427
published_at 2026-04-12T12:55:00Z
9
value 0.11007
scoring_system epss
scoring_elements 0.93428
published_at 2026-04-13T12:55:00Z
10
value 0.11007
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-16T12:55:00Z
11
value 0.11007
scoring_system epss
scoring_elements 0.93452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623242
reference_id 1623242
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1623242
5
reference_url https://security.gentoo.org/glsa/201811-01
reference_id GLSA-201811-01
reference_type
scores
url https://security.gentoo.org/glsa/201811-01
6
reference_url https://access.redhat.com/errata/RHSA-2019:2079
reference_id RHSA-2019:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2079
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
purl pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-941j-gajx-1qc9
1
vulnerability VCID-byet-4t52-1kf5
2
vulnerability VCID-e89b-946w-g7fp
3
vulnerability VCID-r53t-w3cp-4kbm
4
vulnerability VCID-sujt-svg4-kbfp
5
vulnerability VCID-tmju-y3w5-z3es
6
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2
aliases CVE-2018-14600
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16w3-mvk5-8bfg
1
url VCID-22vh-wnqm-qqh5
vulnerability_id VCID-22vh-wnqm-qqh5
summary
Multiple vulnerabilities have been found in X.Org  server and
    libraries, the worse of which allowing local attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7943
reference_id
reference_type
scores
0
value 0.0439
scoring_system epss
scoring_elements 0.8894
published_at 2026-04-01T12:55:00Z
1
value 0.0439
scoring_system epss
scoring_elements 0.88948
published_at 2026-04-02T12:55:00Z
2
value 0.0439
scoring_system epss
scoring_elements 0.88964
published_at 2026-04-04T12:55:00Z
3
value 0.0439
scoring_system epss
scoring_elements 0.88967
published_at 2026-04-07T12:55:00Z
4
value 0.0439
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-08T12:55:00Z
5
value 0.0439
scoring_system epss
scoring_elements 0.8899
published_at 2026-04-09T12:55:00Z
6
value 0.0439
scoring_system epss
scoring_elements 0.89002
published_at 2026-04-11T12:55:00Z
7
value 0.0439
scoring_system epss
scoring_elements 0.88997
published_at 2026-04-12T12:55:00Z
8
value 0.0439
scoring_system epss
scoring_elements 0.88995
published_at 2026-04-13T12:55:00Z
9
value 0.0439
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-16T12:55:00Z
10
value 0.0439
scoring_system epss
scoring_elements 0.89007
published_at 2026-04-18T12:55:00Z
11
value 0.0439
scoring_system epss
scoring_elements 0.89003
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1381861
reference_id 1381861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1381861
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
reference_id 840439
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
5
reference_url https://security.gentoo.org/glsa/201704-03
reference_id GLSA-201704-03
reference_type
scores
url https://security.gentoo.org/glsa/201704-03
6
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
7
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1
purl pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-941j-gajx-1qc9
2
vulnerability VCID-byet-4t52-1kf5
3
vulnerability VCID-e89b-946w-g7fp
4
vulnerability VCID-enay-5y1j-ffa4
5
vulnerability VCID-npqc-cahn-cfgk
6
vulnerability VCID-r53t-w3cp-4kbm
7
vulnerability VCID-sujt-svg4-kbfp
8
vulnerability VCID-tmju-y3w5-z3es
9
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1
aliases CVE-2016-7943
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5
2
url VCID-941j-gajx-1qc9
vulnerability_id VCID-941j-gajx-1qc9
summary
A vulnerability in X.Org X11 library could lead to a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31535
reference_id
reference_type
scores
0
value 0.0206
scoring_system epss
scoring_elements 0.83844
published_at 2026-04-01T12:55:00Z
1
value 0.0206
scoring_system epss
scoring_elements 0.83938
published_at 2026-04-21T12:55:00Z
2
value 0.0206
scoring_system epss
scoring_elements 0.83911
published_at 2026-04-13T12:55:00Z
3
value 0.0206
scoring_system epss
scoring_elements 0.83937
published_at 2026-04-16T12:55:00Z
4
value 0.0206
scoring_system epss
scoring_elements 0.83857
published_at 2026-04-02T12:55:00Z
5
value 0.0206
scoring_system epss
scoring_elements 0.83873
published_at 2026-04-04T12:55:00Z
6
value 0.0206
scoring_system epss
scoring_elements 0.83875
published_at 2026-04-07T12:55:00Z
7
value 0.0206
scoring_system epss
scoring_elements 0.83898
published_at 2026-04-08T12:55:00Z
8
value 0.0206
scoring_system epss
scoring_elements 0.83905
published_at 2026-04-09T12:55:00Z
9
value 0.0206
scoring_system epss
scoring_elements 0.83921
published_at 2026-04-11T12:55:00Z
10
value 0.0206
scoring_system epss
scoring_elements 0.83915
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31535
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1961822
reference_id 1961822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1961822
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737
reference_id 988737
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737
6
reference_url https://security.archlinux.org/ASA-202105-12
reference_id ASA-202105-12
reference_type
scores
url https://security.archlinux.org/ASA-202105-12
7
reference_url https://security.archlinux.org/AVG-1968
reference_id AVG-1968
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1968
8
reference_url https://security.gentoo.org/glsa/202105-16
reference_id GLSA-202105-16
reference_type
scores
url https://security.gentoo.org/glsa/202105-16
9
reference_url https://access.redhat.com/errata/RHSA-2021:3296
reference_id RHSA-2021:3296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3296
10
reference_url https://access.redhat.com/errata/RHSA-2021:3477
reference_id RHSA-2021:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3477
11
reference_url https://access.redhat.com/errata/RHSA-2021:4326
reference_id RHSA-2021:4326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4326
12
reference_url https://usn.ubuntu.com/4966-1/
reference_id USN-4966-1
reference_type
scores
url https://usn.ubuntu.com/4966-1/
13
reference_url https://usn.ubuntu.com/4966-2/
reference_id USN-4966-2
reference_type
scores
url https://usn.ubuntu.com/4966-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
purl pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-941j-gajx-1qc9
1
vulnerability VCID-byet-4t52-1kf5
2
vulnerability VCID-e89b-946w-g7fp
3
vulnerability VCID-r53t-w3cp-4kbm
4
vulnerability VCID-sujt-svg4-kbfp
5
vulnerability VCID-tmju-y3w5-z3es
6
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2
aliases CVE-2021-31535
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-941j-gajx-1qc9
3
url VCID-byet-4t52-1kf5
vulnerability_id VCID-byet-4t52-1kf5
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43785
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27561
published_at 2026-04-21T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27774
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27616
published_at 2026-04-13T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27626
published_at 2026-04-16T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.276
published_at 2026-04-18T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27812
published_at 2026-04-04T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27604
published_at 2026-04-07T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.2767
published_at 2026-04-08T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27714
published_at 2026-04-09T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27718
published_at 2026-04-11T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43785
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242252
reference_id 2242252
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242252
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://access.redhat.com/security/cve/CVE-2023-43785
reference_id CVE-2023-43785
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://access.redhat.com/security/cve/CVE-2023-43785
12
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
13
reference_url https://access.redhat.com/errata/RHSA-2024:2145
reference_id RHSA-2024:2145
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://access.redhat.com/errata/RHSA-2024:2145
14
reference_url https://access.redhat.com/errata/RHSA-2024:2973
reference_id RHSA-2024:2973
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://access.redhat.com/errata/RHSA-2024:2973
15
reference_url https://usn.ubuntu.com/6407-1/
reference_id USN-6407-1
reference_type
scores
url https://usn.ubuntu.com/6407-1/
16
reference_url https://usn.ubuntu.com/6407-2/
reference_id USN-6407-2
reference_type
scores
url https://usn.ubuntu.com/6407-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2
aliases CVE-2023-43785
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byet-4t52-1kf5
4
url VCID-e19k-nptv-ffgr
vulnerability_id VCID-e19k-nptv-ffgr
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
reference_id
reference_type
scores
0
value 0.01877
scoring_system epss
scoring_elements 0.83061
published_at 2026-04-01T12:55:00Z
1
value 0.01877
scoring_system epss
scoring_elements 0.83077
published_at 2026-04-02T12:55:00Z
2
value 0.01877
scoring_system epss
scoring_elements 0.83091
published_at 2026-04-04T12:55:00Z
3
value 0.01877
scoring_system epss
scoring_elements 0.8309
published_at 2026-04-07T12:55:00Z
4
value 0.01877
scoring_system epss
scoring_elements 0.83114
published_at 2026-04-08T12:55:00Z
5
value 0.01877
scoring_system epss
scoring_elements 0.83122
published_at 2026-04-09T12:55:00Z
6
value 0.01877
scoring_system epss
scoring_elements 0.83138
published_at 2026-04-11T12:55:00Z
7
value 0.01877
scoring_system epss
scoring_elements 0.83132
published_at 2026-04-12T12:55:00Z
8
value 0.01877
scoring_system epss
scoring_elements 0.83128
published_at 2026-04-13T12:55:00Z
9
value 0.01877
scoring_system epss
scoring_elements 0.83165
published_at 2026-04-16T12:55:00Z
10
value 0.01877
scoring_system epss
scoring_elements 0.83166
published_at 2026-04-18T12:55:00Z
11
value 0.01877
scoring_system epss
scoring_elements 0.83169
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
reference_id 1209943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
4
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
5
reference_url https://usn.ubuntu.com/2568-1/
reference_id USN-2568-1
reference_type
scores
url https://usn.ubuntu.com/2568-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.2-3
purl pkg:deb/debian/libx11@2:1.6.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-22vh-wnqm-qqh5
2
vulnerability VCID-941j-gajx-1qc9
3
vulnerability VCID-byet-4t52-1kf5
4
vulnerability VCID-e89b-946w-g7fp
5
vulnerability VCID-enay-5y1j-ffa4
6
vulnerability VCID-ngsj-tzms-97e8
7
vulnerability VCID-npqc-cahn-cfgk
8
vulnerability VCID-r53t-w3cp-4kbm
9
vulnerability VCID-sujt-svg4-kbfp
10
vulnerability VCID-tmju-y3w5-z3es
11
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3
aliases CVE-2013-7439
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr
5
url VCID-e89b-946w-g7fp
vulnerability_id VCID-e89b-946w-g7fp
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43786
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24377
published_at 2026-04-21T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24557
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24398
published_at 2026-04-13T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24414
published_at 2026-04-16T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24406
published_at 2026-04-18T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24594
published_at 2026-04-04T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24371
published_at 2026-04-07T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.2444
published_at 2026-04-08T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24485
published_at 2026-04-09T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24499
published_at 2026-04-11T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24455
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43786
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242253
reference_id 2242253
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242253
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://access.redhat.com/security/cve/CVE-2023-43786
reference_id CVE-2023-43786
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://access.redhat.com/security/cve/CVE-2023-43786
12
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
13
reference_url https://access.redhat.com/errata/RHSA-2024:2145
reference_id RHSA-2024:2145
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://access.redhat.com/errata/RHSA-2024:2145
14
reference_url https://access.redhat.com/errata/RHSA-2024:2973
reference_id RHSA-2024:2973
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://access.redhat.com/errata/RHSA-2024:2973
15
reference_url https://usn.ubuntu.com/6407-1/
reference_id USN-6407-1
reference_type
scores
url https://usn.ubuntu.com/6407-1/
16
reference_url https://usn.ubuntu.com/6407-2/
reference_id USN-6407-2
reference_type
scores
url https://usn.ubuntu.com/6407-2/
17
reference_url https://usn.ubuntu.com/6408-1/
reference_id USN-6408-1
reference_type
scores
url https://usn.ubuntu.com/6408-1/
18
reference_url https://usn.ubuntu.com/6408-2/
reference_id USN-6408-2
reference_type
scores
url https://usn.ubuntu.com/6408-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2
aliases CVE-2023-43786
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e89b-946w-g7fp
6
url VCID-enay-5y1j-ffa4
vulnerability_id VCID-enay-5y1j-ffa4
summary
Multiple vulnerabilities have been found in X.Org X11 library, the
    worst of which could allow for remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14599
reference_id
reference_type
scores
0
value 0.01708
scoring_system epss
scoring_elements 0.82256
published_at 2026-04-01T12:55:00Z
1
value 0.01708
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-02T12:55:00Z
2
value 0.01708
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-04T12:55:00Z
3
value 0.01708
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-07T12:55:00Z
4
value 0.01708
scoring_system epss
scoring_elements 0.8231
published_at 2026-04-08T12:55:00Z
5
value 0.01708
scoring_system epss
scoring_elements 0.82317
published_at 2026-04-09T12:55:00Z
6
value 0.01708
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-11T12:55:00Z
7
value 0.01734
scoring_system epss
scoring_elements 0.82508
published_at 2026-04-21T12:55:00Z
8
value 0.01734
scoring_system epss
scoring_elements 0.82473
published_at 2026-04-12T12:55:00Z
9
value 0.01734
scoring_system epss
scoring_elements 0.82468
published_at 2026-04-13T12:55:00Z
10
value 0.01734
scoring_system epss
scoring_elements 0.82504
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623250
reference_id 1623250
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1623250
5
reference_url https://security.gentoo.org/glsa/201811-01
reference_id GLSA-201811-01
reference_type
scores
url https://security.gentoo.org/glsa/201811-01
6
reference_url https://access.redhat.com/errata/RHSA-2019:2079
reference_id RHSA-2019:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2079
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
purl pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-941j-gajx-1qc9
1
vulnerability VCID-byet-4t52-1kf5
2
vulnerability VCID-e89b-946w-g7fp
3
vulnerability VCID-r53t-w3cp-4kbm
4
vulnerability VCID-sujt-svg4-kbfp
5
vulnerability VCID-tmju-y3w5-z3es
6
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2
aliases CVE-2018-14599
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-enay-5y1j-ffa4
7
url VCID-ngsj-tzms-97e8
vulnerability_id VCID-ngsj-tzms-97e8
summary
Multiple vulnerabilities have been found in X.Org  server and
    libraries, the worse of which allowing local attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7942
reference_id
reference_type
scores
0
value 0.04712
scoring_system epss
scoring_elements 0.89332
published_at 2026-04-01T12:55:00Z
1
value 0.04712
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-02T12:55:00Z
2
value 0.04712
scoring_system epss
scoring_elements 0.89348
published_at 2026-04-04T12:55:00Z
3
value 0.04712
scoring_system epss
scoring_elements 0.8935
published_at 2026-04-07T12:55:00Z
4
value 0.04712
scoring_system epss
scoring_elements 0.89367
published_at 2026-04-08T12:55:00Z
5
value 0.04712
scoring_system epss
scoring_elements 0.89371
published_at 2026-04-09T12:55:00Z
6
value 0.04712
scoring_system epss
scoring_elements 0.8938
published_at 2026-04-11T12:55:00Z
7
value 0.04712
scoring_system epss
scoring_elements 0.89377
published_at 2026-04-12T12:55:00Z
8
value 0.04712
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-13T12:55:00Z
9
value 0.04712
scoring_system epss
scoring_elements 0.89388
published_at 2026-04-18T12:55:00Z
10
value 0.04712
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1381859
reference_id 1381859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1381859
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
reference_id 840439
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
6
reference_url https://security.gentoo.org/glsa/201704-03
reference_id GLSA-201704-03
reference_type
scores
url https://security.gentoo.org/glsa/201704-03
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1
purl pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-941j-gajx-1qc9
2
vulnerability VCID-byet-4t52-1kf5
3
vulnerability VCID-e89b-946w-g7fp
4
vulnerability VCID-enay-5y1j-ffa4
5
vulnerability VCID-npqc-cahn-cfgk
6
vulnerability VCID-r53t-w3cp-4kbm
7
vulnerability VCID-sujt-svg4-kbfp
8
vulnerability VCID-tmju-y3w5-z3es
9
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1
aliases CVE-2016-7942
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8
8
url VCID-npqc-cahn-cfgk
vulnerability_id VCID-npqc-cahn-cfgk
summary
Multiple vulnerabilities have been found in X.Org X11 library, the
    worst of which could allow for remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14598
reference_id
reference_type
scores
0
value 0.01105
scoring_system epss
scoring_elements 0.78032
published_at 2026-04-01T12:55:00Z
1
value 0.01105
scoring_system epss
scoring_elements 0.78041
published_at 2026-04-02T12:55:00Z
2
value 0.01105
scoring_system epss
scoring_elements 0.7807
published_at 2026-04-04T12:55:00Z
3
value 0.01105
scoring_system epss
scoring_elements 0.78053
published_at 2026-04-07T12:55:00Z
4
value 0.01105
scoring_system epss
scoring_elements 0.78079
published_at 2026-04-08T12:55:00Z
5
value 0.01105
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-09T12:55:00Z
6
value 0.01105
scoring_system epss
scoring_elements 0.78109
published_at 2026-04-11T12:55:00Z
7
value 0.03035
scoring_system epss
scoring_elements 0.86683
published_at 2026-04-18T12:55:00Z
8
value 0.03035
scoring_system epss
scoring_elements 0.86671
published_at 2026-04-12T12:55:00Z
9
value 0.03035
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-13T12:55:00Z
10
value 0.03035
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623238
reference_id 1623238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1623238
5
reference_url https://security.gentoo.org/glsa/201811-01
reference_id GLSA-201811-01
reference_type
scores
url https://security.gentoo.org/glsa/201811-01
6
reference_url https://access.redhat.com/errata/RHSA-2019:2079
reference_id RHSA-2019:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2079
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
purl pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-941j-gajx-1qc9
1
vulnerability VCID-byet-4t52-1kf5
2
vulnerability VCID-e89b-946w-g7fp
3
vulnerability VCID-r53t-w3cp-4kbm
4
vulnerability VCID-sujt-svg4-kbfp
5
vulnerability VCID-tmju-y3w5-z3es
6
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2
aliases CVE-2018-14598
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npqc-cahn-cfgk
9
url VCID-r53t-w3cp-4kbm
vulnerability_id VCID-r53t-w3cp-4kbm
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43787
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12695
published_at 2026-04-21T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12804
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12669
published_at 2026-04-13T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12575
published_at 2026-04-16T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12586
published_at 2026-04-18T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12852
published_at 2026-04-04T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12657
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12736
published_at 2026-04-08T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12787
published_at 2026-04-09T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12756
published_at 2026-04-11T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12717
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43787
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242254
reference_id 2242254
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242254
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://access.redhat.com/security/cve/CVE-2023-43787
reference_id CVE-2023-43787
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://access.redhat.com/security/cve/CVE-2023-43787
12
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
13
reference_url https://access.redhat.com/errata/RHSA-2024:2145
reference_id RHSA-2024:2145
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://access.redhat.com/errata/RHSA-2024:2145
14
reference_url https://access.redhat.com/errata/RHSA-2024:2973
reference_id RHSA-2024:2973
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://access.redhat.com/errata/RHSA-2024:2973
15
reference_url https://usn.ubuntu.com/6407-1/
reference_id USN-6407-1
reference_type
scores
url https://usn.ubuntu.com/6407-1/
16
reference_url https://usn.ubuntu.com/6407-2/
reference_id USN-6407-2
reference_type
scores
url https://usn.ubuntu.com/6407-2/
17
reference_url https://usn.ubuntu.com/6408-1/
reference_id USN-6408-1
reference_type
scores
url https://usn.ubuntu.com/6408-1/
18
reference_url https://usn.ubuntu.com/6408-2/
reference_id USN-6408-2
reference_type
scores
url https://usn.ubuntu.com/6408-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2
aliases CVE-2023-43787
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r53t-w3cp-4kbm
10
url VCID-sujt-svg4-kbfp
vulnerability_id VCID-sujt-svg4-kbfp
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3138
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24061
published_at 2026-04-02T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.241
published_at 2026-04-04T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23883
published_at 2026-04-07T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23949
published_at 2026-04-08T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23995
published_at 2026-04-09T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.24012
published_at 2026-04-11T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.23969
published_at 2026-04-12T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23913
published_at 2026-04-13T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23922
published_at 2026-04-16T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23911
published_at 2026-04-18T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23893
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133
reference_id 1038133
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213748
reference_id 2213748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213748
6
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
7
reference_url https://access.redhat.com/errata/RHSA-2023:6497
reference_id RHSA-2023:6497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6497
8
reference_url https://access.redhat.com/errata/RHSA-2023:7029
reference_id RHSA-2023:7029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7029
9
reference_url https://access.redhat.com/errata/RHSA-2024:1088
reference_id RHSA-2024:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1088
10
reference_url https://access.redhat.com/errata/RHSA-2024:1417
reference_id RHSA-2024:1417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1417
11
reference_url https://usn.ubuntu.com/6168-1/
reference_id USN-6168-1
reference_type
scores
url https://usn.ubuntu.com/6168-1/
12
reference_url https://usn.ubuntu.com/6168-2/
reference_id USN-6168-2
reference_type
scores
url https://usn.ubuntu.com/6168-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2
aliases CVE-2023-3138
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sujt-svg4-kbfp
11
url VCID-tmju-y3w5-z3es
vulnerability_id VCID-tmju-y3w5-z3es
summary
Multiple vulnerabilities have been found in X.org X11 library, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14363
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35381
published_at 2026-04-01T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.3558
published_at 2026-04-02T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35606
published_at 2026-04-04T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35488
published_at 2026-04-07T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35534
published_at 2026-04-08T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35559
published_at 2026-04-09T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35568
published_at 2026-04-11T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35523
published_at 2026-04-12T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35501
published_at 2026-04-13T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35541
published_at 2026-04-16T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35531
published_at 2026-04-18T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.3548
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872473
reference_id 1872473
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872473
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008
reference_id 969008
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008
6
reference_url https://security.gentoo.org/glsa/202008-18
reference_id GLSA-202008-18
reference_type
scores
url https://security.gentoo.org/glsa/202008-18
7
reference_url https://access.redhat.com/errata/RHSA-2020:4908
reference_id RHSA-2020:4908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4908
8
reference_url https://access.redhat.com/errata/RHSA-2020:4946
reference_id RHSA-2020:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4946
9
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
10
reference_url https://usn.ubuntu.com/4487-1/
reference_id USN-4487-1
reference_type
scores
url https://usn.ubuntu.com/4487-1/
11
reference_url https://usn.ubuntu.com/4487-2/
reference_id USN-4487-2
reference_type
scores
url https://usn.ubuntu.com/4487-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2
aliases CVE-2020-14363
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es
12
url VCID-tsyg-kprr-67ck
vulnerability_id VCID-tsyg-kprr-67ck
summary
Multiple vulnerabilities have been found in X.org X11 library, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14344
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.3701
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37029
published_at 2026-04-21T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37104
published_at 2026-04-16T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37087
published_at 2026-04-18T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37186
published_at 2026-04-02T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37215
published_at 2026-04-04T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37046
published_at 2026-04-07T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37097
published_at 2026-04-08T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37109
published_at 2026-04-09T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.3712
published_at 2026-04-11T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37086
published_at 2026-04-12T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.37058
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862255
reference_id 1862255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862255
5
reference_url https://security.archlinux.org/AVG-1212
reference_id AVG-1212
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1212
6
reference_url https://security.gentoo.org/glsa/202008-18
reference_id GLSA-202008-18
reference_type
scores
url https://security.gentoo.org/glsa/202008-18
7
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
8
reference_url https://usn.ubuntu.com/4487-1/
reference_id USN-4487-1
reference_type
scores
url https://usn.ubuntu.com/4487-1/
9
reference_url https://usn.ubuntu.com/4487-2/
reference_id USN-4487-2
reference_type
scores
url https://usn.ubuntu.com/4487-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2
aliases CVE-2020-14344
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck
Fixing_vulnerabilities
0
url VCID-dcgs-qd3h-k7gq
vulnerability_id VCID-dcgs-qd3h-k7gq
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2004
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60313
published_at 2026-04-18T12:55:00Z
1
value 0.00393
scoring_system epss
scoring_elements 0.60145
published_at 2026-04-01T12:55:00Z
2
value 0.00393
scoring_system epss
scoring_elements 0.60221
published_at 2026-04-02T12:55:00Z
3
value 0.00393
scoring_system epss
scoring_elements 0.60247
published_at 2026-04-04T12:55:00Z
4
value 0.00393
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-07T12:55:00Z
5
value 0.00393
scoring_system epss
scoring_elements 0.60264
published_at 2026-04-08T12:55:00Z
6
value 0.00393
scoring_system epss
scoring_elements 0.60278
published_at 2026-04-09T12:55:00Z
7
value 0.00393
scoring_system epss
scoring_elements 0.60299
published_at 2026-04-21T12:55:00Z
8
value 0.00393
scoring_system epss
scoring_elements 0.60286
published_at 2026-04-12T12:55:00Z
9
value 0.00393
scoring_system epss
scoring_elements 0.60266
published_at 2026-04-13T12:55:00Z
10
value 0.00393
scoring_system epss
scoring_elements 0.60306
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2004
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
5
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959112
reference_id 959112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959112
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2004
reference_id CVE-2013-2004
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2004
13
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
14
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
15
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
purl pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-22vh-wnqm-qqh5
2
vulnerability VCID-941j-gajx-1qc9
3
vulnerability VCID-byet-4t52-1kf5
4
vulnerability VCID-e19k-nptv-ffgr
5
vulnerability VCID-e89b-946w-g7fp
6
vulnerability VCID-enay-5y1j-ffa4
7
vulnerability VCID-ngsj-tzms-97e8
8
vulnerability VCID-npqc-cahn-cfgk
9
vulnerability VCID-r53t-w3cp-4kbm
10
vulnerability VCID-sujt-svg4-kbfp
11
vulnerability VCID-tmju-y3w5-z3es
12
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2
aliases CVE-2013-2004
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq
1
url VCID-e19k-nptv-ffgr
vulnerability_id VCID-e19k-nptv-ffgr
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
reference_id
reference_type
scores
0
value 0.01877
scoring_system epss
scoring_elements 0.83061
published_at 2026-04-01T12:55:00Z
1
value 0.01877
scoring_system epss
scoring_elements 0.83077
published_at 2026-04-02T12:55:00Z
2
value 0.01877
scoring_system epss
scoring_elements 0.83091
published_at 2026-04-04T12:55:00Z
3
value 0.01877
scoring_system epss
scoring_elements 0.8309
published_at 2026-04-07T12:55:00Z
4
value 0.01877
scoring_system epss
scoring_elements 0.83114
published_at 2026-04-08T12:55:00Z
5
value 0.01877
scoring_system epss
scoring_elements 0.83122
published_at 2026-04-09T12:55:00Z
6
value 0.01877
scoring_system epss
scoring_elements 0.83138
published_at 2026-04-11T12:55:00Z
7
value 0.01877
scoring_system epss
scoring_elements 0.83132
published_at 2026-04-12T12:55:00Z
8
value 0.01877
scoring_system epss
scoring_elements 0.83128
published_at 2026-04-13T12:55:00Z
9
value 0.01877
scoring_system epss
scoring_elements 0.83165
published_at 2026-04-16T12:55:00Z
10
value 0.01877
scoring_system epss
scoring_elements 0.83166
published_at 2026-04-18T12:55:00Z
11
value 0.01877
scoring_system epss
scoring_elements 0.83169
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
reference_id 1209943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
4
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
5
reference_url https://usn.ubuntu.com/2568-1/
reference_id USN-2568-1
reference_type
scores
url https://usn.ubuntu.com/2568-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
purl pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-22vh-wnqm-qqh5
2
vulnerability VCID-941j-gajx-1qc9
3
vulnerability VCID-byet-4t52-1kf5
4
vulnerability VCID-e19k-nptv-ffgr
5
vulnerability VCID-e89b-946w-g7fp
6
vulnerability VCID-enay-5y1j-ffa4
7
vulnerability VCID-ngsj-tzms-97e8
8
vulnerability VCID-npqc-cahn-cfgk
9
vulnerability VCID-r53t-w3cp-4kbm
10
vulnerability VCID-sujt-svg4-kbfp
11
vulnerability VCID-tmju-y3w5-z3es
12
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2
1
url pkg:deb/debian/libx11@2:1.6.2-3
purl pkg:deb/debian/libx11@2:1.6.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-22vh-wnqm-qqh5
2
vulnerability VCID-941j-gajx-1qc9
3
vulnerability VCID-byet-4t52-1kf5
4
vulnerability VCID-e89b-946w-g7fp
5
vulnerability VCID-enay-5y1j-ffa4
6
vulnerability VCID-ngsj-tzms-97e8
7
vulnerability VCID-npqc-cahn-cfgk
8
vulnerability VCID-r53t-w3cp-4kbm
9
vulnerability VCID-sujt-svg4-kbfp
10
vulnerability VCID-tmju-y3w5-z3es
11
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3
aliases CVE-2013-7439
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr
2
url VCID-j2u9-4cr6-yqcv
vulnerability_id VCID-j2u9-4cr6-yqcv
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1981
reference_id
reference_type
scores
0
value 0.00894
scoring_system epss
scoring_elements 0.75629
published_at 2026-04-18T12:55:00Z
1
value 0.00894
scoring_system epss
scoring_elements 0.75524
published_at 2026-04-01T12:55:00Z
2
value 0.00894
scoring_system epss
scoring_elements 0.75526
published_at 2026-04-02T12:55:00Z
3
value 0.00894
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-04T12:55:00Z
4
value 0.00894
scoring_system epss
scoring_elements 0.75536
published_at 2026-04-07T12:55:00Z
5
value 0.00894
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-08T12:55:00Z
6
value 0.00894
scoring_system epss
scoring_elements 0.75588
published_at 2026-04-13T12:55:00Z
7
value 0.00894
scoring_system epss
scoring_elements 0.75613
published_at 2026-04-21T12:55:00Z
8
value 0.00894
scoring_system epss
scoring_elements 0.75595
published_at 2026-04-12T12:55:00Z
9
value 0.00894
scoring_system epss
scoring_elements 0.75625
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
6
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.securityfocus.com/bid/60120
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60120
9
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
10
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959040
reference_id 959040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959040
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1981
reference_id CVE-2013-1981
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1981
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
purl pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-22vh-wnqm-qqh5
2
vulnerability VCID-941j-gajx-1qc9
3
vulnerability VCID-byet-4t52-1kf5
4
vulnerability VCID-e19k-nptv-ffgr
5
vulnerability VCID-e89b-946w-g7fp
6
vulnerability VCID-enay-5y1j-ffa4
7
vulnerability VCID-ngsj-tzms-97e8
8
vulnerability VCID-npqc-cahn-cfgk
9
vulnerability VCID-r53t-w3cp-4kbm
10
vulnerability VCID-sujt-svg4-kbfp
11
vulnerability VCID-tmju-y3w5-z3es
12
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2
aliases CVE-2013-1981
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv
3
url VCID-jz8t-44r3-3yc5
vulnerability_id VCID-jz8t-44r3-3yc5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1997
reference_id
reference_type
scores
0
value 0.00727
scoring_system epss
scoring_elements 0.72648
published_at 2026-04-21T12:55:00Z
1
value 0.00727
scoring_system epss
scoring_elements 0.72558
published_at 2026-04-01T12:55:00Z
2
value 0.00727
scoring_system epss
scoring_elements 0.72566
published_at 2026-04-02T12:55:00Z
3
value 0.00727
scoring_system epss
scoring_elements 0.72582
published_at 2026-04-04T12:55:00Z
4
value 0.00727
scoring_system epss
scoring_elements 0.72559
published_at 2026-04-07T12:55:00Z
5
value 0.00727
scoring_system epss
scoring_elements 0.72597
published_at 2026-04-08T12:55:00Z
6
value 0.00727
scoring_system epss
scoring_elements 0.72609
published_at 2026-04-09T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72633
published_at 2026-04-11T12:55:00Z
8
value 0.00727
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-12T12:55:00Z
9
value 0.00727
scoring_system epss
scoring_elements 0.72605
published_at 2026-04-13T12:55:00Z
10
value 0.00727
scoring_system epss
scoring_elements 0.72647
published_at 2026-04-16T12:55:00Z
11
value 0.00727
scoring_system epss
scoring_elements 0.72657
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1997
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
6
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960345
reference_id 960345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960345
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1997
reference_id CVE-2013-1997
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1997
14
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
15
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
16
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
purl pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16w3-mvk5-8bfg
1
vulnerability VCID-22vh-wnqm-qqh5
2
vulnerability VCID-941j-gajx-1qc9
3
vulnerability VCID-byet-4t52-1kf5
4
vulnerability VCID-e19k-nptv-ffgr
5
vulnerability VCID-e89b-946w-g7fp
6
vulnerability VCID-enay-5y1j-ffa4
7
vulnerability VCID-ngsj-tzms-97e8
8
vulnerability VCID-npqc-cahn-cfgk
9
vulnerability VCID-r53t-w3cp-4kbm
10
vulnerability VCID-sujt-svg4-kbfp
11
vulnerability VCID-tmju-y3w5-z3es
12
vulnerability VCID-tsyg-kprr-67ck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2
aliases CVE-2013-1997
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2