Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/76696?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "type": "ebuild", "namespace": "x11-base", "name": "xwayland", "version": "21.1.8", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "21.1.11", "latest_non_vulnerable_version": "24.1.6", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46286?format=api", "vulnerability_id": "VCID-1cjg-y5qm-sffh", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4008", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22403", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22474", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22471", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.224", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22555", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22514", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026059", "reference_id": "2026059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026059" }, { "reference_url": "https://security.archlinux.org/AVG-2636", "reference_id": "AVG-2636", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2636" }, { "reference_url": "https://security.archlinux.org/AVG-2640", "reference_id": "AVG-2640", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2640" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0003", "reference_id": "RHSA-2022:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1917", "reference_id": "RHSA-2022:1917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1917" }, { "reference_url": "https://usn.ubuntu.com/5193-1/", "reference_id": "USN-5193-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-1/" }, { "reference_url": "https://usn.ubuntu.com/5193-2/", "reference_id": "USN-5193-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-2/" }, { "reference_url": "https://usn.ubuntu.com/5193-3/", "reference_id": "USN-5193-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2021-4008" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjg-y5qm-sffh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46300?format=api", "vulnerability_id": "VCID-28er-gwh3-rugq", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33954", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3402", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3409", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34059", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35176", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35239", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35225", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071", "reference_id": "1026071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757", "reference_id": "2151757", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/", "reference_id": "5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-46342", "reference_id": "CVE-2022-46342", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-46342" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5304", "reference_id": "dsa-5304", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5304" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/", "reference_id": "DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/" } ], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0045", "reference_id": "RHSA-2023:0045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0046", "reference_id": "RHSA-2023:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2257", "reference_id": "RHSA-2023:2257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2830", "reference_id": "RHSA-2023:2830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://usn.ubuntu.com/5778-1/", "reference_id": "USN-5778-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-1/" }, { "reference_url": "https://usn.ubuntu.com/5778-2/", "reference_id": "USN-5778-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "reference_id": "Z67QC4C3I2FI2WRFIUPEHKC36J362MLA", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-46342" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46298?format=api", "vulnerability_id": "VCID-44yr-b94s-nfd5", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78262", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78293", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78316", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78309", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78951", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78955", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01202", "scoring_system": "epss", "scoring_elements": "0.78952", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071", "reference_id": "1026071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755", "reference_id": "2151755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0045", "reference_id": "RHSA-2023:0045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0046", "reference_id": "RHSA-2023:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2257", "reference_id": "RHSA-2023:2257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2830", "reference_id": "RHSA-2023:2830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://usn.ubuntu.com/5778-1/", "reference_id": "USN-5778-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-1/" }, { "reference_url": "https://usn.ubuntu.com/5778-2/", "reference_id": "USN-5778-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-46340" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46290?format=api", "vulnerability_id": "VCID-6qsh-kaxk-zuf9", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4011", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12368", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12386", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12422", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12381", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12282", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12476", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12518", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1246", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026074", "reference_id": "2026074", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026074" }, { "reference_url": "https://security.archlinux.org/AVG-2636", "reference_id": "AVG-2636", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2636" }, { "reference_url": "https://security.archlinux.org/AVG-2640", "reference_id": "AVG-2640", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2640" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0003", "reference_id": "RHSA-2022:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1917", "reference_id": "RHSA-2022:1917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1917" }, { "reference_url": "https://usn.ubuntu.com/5193-1/", "reference_id": "USN-5193-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-1/" }, { "reference_url": "https://usn.ubuntu.com/5193-2/", "reference_id": "USN-5193-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-2/" }, { "reference_url": "https://usn.ubuntu.com/5193-3/", "reference_id": "USN-5193-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2021-4011" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qsh-kaxk-zuf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46302?format=api", "vulnerability_id": "VCID-a4bk-m98g-93f8", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75742", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75721", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00966", "scoring_system": "epss", "scoring_elements": "0.7661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00966", "scoring_system": "epss", "scoring_elements": "0.76618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00966", "scoring_system": "epss", "scoring_elements": "0.76622", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071", "reference_id": "1026071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760", "reference_id": "2151760", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0045", "reference_id": "RHSA-2023:0045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0046", "reference_id": "RHSA-2023:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2257", "reference_id": "RHSA-2023:2257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2830", "reference_id": "RHSA-2023:2830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://usn.ubuntu.com/5778-1/", "reference_id": "USN-5778-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-1/" }, { "reference_url": "https://usn.ubuntu.com/5778-2/", "reference_id": "USN-5778-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-46344" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46294?format=api", "vulnerability_id": "VCID-bvay-s9w4-muf8", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73079", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73099", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73109", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73121", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73164", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73174", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73165", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140701", "reference_id": "2140701", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140701" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8491", "reference_id": "RHSA-2022:8491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://usn.ubuntu.com/5740-1/", "reference_id": "USN-5740-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5740-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-3551" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bvay-s9w4-muf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46296?format=api", "vulnerability_id": "VCID-cxf3-8znp-rbbz", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30833", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30671", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30788", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30747", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30725", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30705", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30756", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140706", "reference_id": "2140706", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140706" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/" } ], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://vuldb.com/?id.211053", "reference_id": "?id.211053", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/" } ], "url": "https://vuldb.com/?id.211053" }, { "reference_url": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3", "reference_id": "?id=dfd057996b26420309c324ec844a5ba6dd07eda3", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/" } ], "url": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-3553" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cxf3-8znp-rbbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46297?format=api", "vulnerability_id": "VCID-e7w3-3hpm-hbec", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39146", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39135", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39121", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39089", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40477", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40585", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40554", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071", "reference_id": "1026071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761", "reference_id": "2151761", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/", "reference_id": "5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-4283", "reference_id": "CVE-2022-4283", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-4283" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5304", "reference_id": "dsa-5304", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5304" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/", "reference_id": "DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/" } ], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0045", "reference_id": "RHSA-2023:0045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0046", "reference_id": "RHSA-2023:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2257", "reference_id": "RHSA-2023:2257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2830", "reference_id": "RHSA-2023:2830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://usn.ubuntu.com/5778-1/", "reference_id": "USN-5778-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-1/" }, { "reference_url": "https://usn.ubuntu.com/5778-2/", "reference_id": "USN-5778-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "reference_id": "Z67QC4C3I2FI2WRFIUPEHKC36J362MLA", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-4283" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46289?format=api", "vulnerability_id": "VCID-fcac-qzvs-rfa8", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4010", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23318", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23355", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23362", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23375", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23528", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23312", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23417", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026073", "reference_id": "2026073", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026073" }, { "reference_url": "https://security.archlinux.org/AVG-2636", "reference_id": "AVG-2636", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2636" }, { "reference_url": "https://security.archlinux.org/AVG-2640", "reference_id": "AVG-2640", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2640" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0003", "reference_id": "RHSA-2022:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1917", "reference_id": "RHSA-2022:1917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1917" }, { "reference_url": "https://usn.ubuntu.com/5193-1/", "reference_id": "USN-5193-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2021-4010" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fcac-qzvs-rfa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46299?format=api", "vulnerability_id": "VCID-jrx7-pbf3-h3at", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78136", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78154", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01181", "scoring_system": "epss", "scoring_elements": "0.78774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01181", "scoring_system": "epss", "scoring_elements": "0.7878", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01181", "scoring_system": "epss", "scoring_elements": "0.78778", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071", "reference_id": "1026071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756", "reference_id": "2151756", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/", "reference_id": "5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-46341", "reference_id": "CVE-2022-46341", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-46341" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5304", "reference_id": "dsa-5304", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5304" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/", "reference_id": "DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/" } ], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0045", "reference_id": "RHSA-2023:0045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0046", "reference_id": "RHSA-2023:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2257", "reference_id": "RHSA-2023:2257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2830", "reference_id": "RHSA-2023:2830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://usn.ubuntu.com/5778-1/", "reference_id": "USN-5778-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-1/" }, { "reference_url": "https://usn.ubuntu.com/5778-2/", "reference_id": "USN-5778-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "reference_id": "Z67QC4C3I2FI2WRFIUPEHKC36J362MLA", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-46341" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46292?format=api", "vulnerability_id": "VCID-m2hp-k4c4-m3db", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61403", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61431", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61401", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61448", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61464", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61485", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61453", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61492", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61496", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.6148", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140698", "reference_id": "2140698", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140698" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8491", "reference_id": "RHSA-2022:8491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://usn.ubuntu.com/5740-1/", "reference_id": "USN-5740-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5740-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-3550" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2hp-k4c4-m3db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46301?format=api", "vulnerability_id": "VCID-uxsy-k3cg-mkdd", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46343", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78136", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78154", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01181", "scoring_system": "epss", "scoring_elements": "0.78774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01181", "scoring_system": "epss", "scoring_elements": "0.7878", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01181", "scoring_system": "epss", "scoring_elements": "0.78778", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071", "reference_id": "1026071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758", "reference_id": "2151758", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/", "reference_id": "5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-46343", "reference_id": "CVE-2022-46343", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-46343" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5304", "reference_id": "dsa-5304", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5304" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/", "reference_id": "DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/" } ], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0045", "reference_id": "RHSA-2023:0045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0046", "reference_id": "RHSA-2023:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2257", "reference_id": "RHSA-2023:2257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2830", "reference_id": "RHSA-2023:2830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://usn.ubuntu.com/5778-1/", "reference_id": "USN-5778-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-1/" }, { "reference_url": "https://usn.ubuntu.com/5778-2/", "reference_id": "USN-5778-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "reference_id": "Z67QC4C3I2FI2WRFIUPEHKC36J362MLA", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2022-46343" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46303?format=api", "vulnerability_id": "VCID-wh9v-35ju-vbcb", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69831", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69816", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69792", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69768", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72292", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72295", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72304", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.x.org/archives/xorg-announce/2023-February/003320.html", "reference_id": "003320.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/" } ], "url": "https://lists.x.org/archives/xorg-announce/2023-February/003320.html" }, { "reference_url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec", "reference_id": "0ba6d8c37071131a49790243cdac55392ecf71ec", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/" } ], "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777", "reference_id": "1030777", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995", "reference_id": "2165995", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/" } ], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0622", "reference_id": "RHSA-2023:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0623", "reference_id": "RHSA-2023:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0662", "reference_id": "RHSA-2023:0662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0663", "reference_id": "RHSA-2023:0663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0664", "reference_id": "RHSA-2023:0664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0665", "reference_id": "RHSA-2023:0665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0671", "reference_id": "RHSA-2023:0671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0675", "reference_id": "RHSA-2023:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2248", "reference_id": "RHSA-2023:2248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2249", "reference_id": "RHSA-2023:2249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2805", "reference_id": "RHSA-2023:2805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2806", "reference_id": "RHSA-2023:2806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://usn.ubuntu.com/5778-2/", "reference_id": "USN-5778-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5778-2/" }, { "reference_url": "https://usn.ubuntu.com/5846-1/", "reference_id": "USN-5846-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5846-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2023-0494" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wh9v-35ju-vbcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46305?format=api", "vulnerability_id": "VCID-wp8b-r6p1-7kcf", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23801", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23706", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23687", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23841", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23618", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25972", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26007", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/03/29/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/03/29/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288", "reference_id": "2180288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288" }, { "reference_url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110", "reference_id": "26ef545b3502f61ca722a7a3373507e88ef64110", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/", "reference_id": "BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/", "reference_id": "H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/", "reference_id": "MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/", "reference_id": "NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/", "reference_id": "PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/", "reference_id": "QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1548", "reference_id": "RHSA-2023:1548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1549", "reference_id": "RHSA-2023:1549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1551", "reference_id": "RHSA-2023:1551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1592", "reference_id": "RHSA-2023:1592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1594", "reference_id": "RHSA-2023:1594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1598", "reference_id": "RHSA-2023:1598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1599", "reference_id": "RHSA-2023:1599", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1600", "reference_id": "RHSA-2023:1600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6340", "reference_id": "RHSA-2023:6340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6341", "reference_id": "RHSA-2023:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6916", "reference_id": "RHSA-2023:6916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6916" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6917", "reference_id": "RHSA-2023:6917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12751", "reference_id": "RHSA-2025:12751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12751" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/", "reference_id": "SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/", "reference_id": "SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/" }, { "reference_url": "https://usn.ubuntu.com/5986-1/", "reference_id": "USN-5986-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5986-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2023-1393" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp8b-r6p1-7kcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46287?format=api", "vulnerability_id": "VCID-zhdy-8stm-q3ey", "summary": "Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4009", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25795", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25702", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25684", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25855", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25898", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25741", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25799", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25757", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026072", "reference_id": "2026072", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026072" }, { "reference_url": "https://security.archlinux.org/AVG-2636", "reference_id": "AVG-2636", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2636" }, { "reference_url": "https://security.archlinux.org/AVG-2640", "reference_id": "AVG-2640", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2640" }, { "reference_url": "https://security.gentoo.org/glsa/202305-30", "reference_id": "GLSA-202305-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0003", "reference_id": "RHSA-2022:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1917", "reference_id": "RHSA-2022:1917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1917" }, { "reference_url": "https://usn.ubuntu.com/5193-1/", "reference_id": "USN-5193-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-1/" }, { "reference_url": "https://usn.ubuntu.com/5193-2/", "reference_id": "USN-5193-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-2/" }, { "reference_url": "https://usn.ubuntu.com/5193-3/", "reference_id": "USN-5193-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5193-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76696?format=api", "purl": "pkg:ebuild/x11-base/xwayland@21.1.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/76697?format=api", "purl": "pkg:ebuild/x11-base/xwayland@23.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1" } ], "aliases": [ "CVE-2021-4009" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zhdy-8stm-q3ey" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8" }