Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/77190?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "type": "ebuild", "namespace": "x11-libs", "name": "libXdmcp", "version": "1.0.9-r1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.1.2-r1", "latest_non_vulnerable_version": "1.19.2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47762?format=api", "vulnerability_id": "VCID-19wc-vc13-jyhz", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7953.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7953.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7953", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78791", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78797", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78828", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78811", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78837", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78843", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.7885", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.7884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78866", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7953" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381933", "reference_id": "1381933", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381933" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840445", "reference_id": "840445", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840445" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7953" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-19wc-vc13-jyhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47741?format=api", "vulnerability_id": "VCID-22vh-wnqm-qqh5", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.8894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88964", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.8899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89002", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89007", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861", "reference_id": "1381861", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439", "reference_id": "840439", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7943" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47733?format=api", "vulnerability_id": "VCID-427g-dedk-4yez", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5407.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5407.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.8408", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84093", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84111", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84135", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84159", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84153", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84171", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02123", "scoring_system": "epss", "scoring_elements": "0.84172", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381931", "reference_id": "1381931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381931" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840438", "reference_id": "840438", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840438" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5449-1/", "reference_id": "USN-5449-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5449-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-5407" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-427g-dedk-4yez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47742?format=api", "vulnerability_id": "VCID-aurn-64nj-afc6", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7944.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7944.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7944", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69404", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69416", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69432", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69412", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69485", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69471", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7944" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381865", "reference_id": "1381865", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381865" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840442", "reference_id": "840442", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840442" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5437-1/", "reference_id": "USN-5437-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5437-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7944" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aurn-64nj-afc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47757?format=api", "vulnerability_id": "VCID-crm3-2cn7-3bhy", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7949.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7949.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7949", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89413", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89427", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89445", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89449", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89457", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89456", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89451", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04763", "scoring_system": "epss", "scoring_elements": "0.89467", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7949" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381927", "reference_id": "1381927", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381927" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840443", "reference_id": "840443", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840443" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5436-1/", "reference_id": "USN-5436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7949" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crm3-2cn7-3bhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47755?format=api", "vulnerability_id": "VCID-dbcf-kdfu-x7ha", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7948.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7948.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7948", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.8685", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86911", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86922", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86927", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381873", "reference_id": "1381873", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381873" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840441", "reference_id": "840441", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840441" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5428-1/", "reference_id": "USN-5428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7948" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dbcf-kdfu-x7ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47763?format=api", "vulnerability_id": "VCID-dmzz-9tgp-bker", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23059", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22895", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22968", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2302", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23039", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23001", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22946", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22961", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22954", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424987", "reference_id": "1424987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424987" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856399", "reference_id": "856399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856399" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1865", "reference_id": "RHSA-2017:1865", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1865" }, { "reference_url": "https://usn.ubuntu.com/5690-1/", "reference_id": "USN-5690-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5690-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2017-2625" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dmzz-9tgp-bker" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47767?format=api", "vulnerability_id": "VCID-kfgp-p41p-2kgd", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26997", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2686", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26878", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26889", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27037", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26932", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26978", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26982", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26936", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424992", "reference_id": "1424992", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424992" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856400", "reference_id": "856400", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856400" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1865", "reference_id": "RHSA-2017:1865", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1865" }, { "reference_url": "https://usn.ubuntu.com/5744-1/", "reference_id": "USN-5744-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5744-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2017-2626" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kfgp-p41p-2kgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47736?format=api", "vulnerability_id": "VCID-ngsj-tzms-97e8", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89348", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.8935", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89367", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89388", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859", "reference_id": "1381859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439", "reference_id": "840439", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7942" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47752?format=api", "vulnerability_id": "VCID-p98s-5y1c-ubhk", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7947.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7947.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7947", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.8685", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86911", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86922", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03155", "scoring_system": "epss", "scoring_elements": "0.86927", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381872", "reference_id": "1381872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381872" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840441", "reference_id": "840441", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840441" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5428-1/", "reference_id": "USN-5428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5428-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7947" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p98s-5y1c-ubhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47758?format=api", "vulnerability_id": "VCID-q5s2-fr7a-xfcp", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7950.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7950.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7950", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73043", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73063", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73038", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73113", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73092", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73086", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00747", "scoring_system": "epss", "scoring_elements": "0.73138", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381928", "reference_id": "1381928", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381928" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840443", "reference_id": "840443", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840443" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5436-1/", "reference_id": "USN-5436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7950" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5s2-fr7a-xfcp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41477?format=api", "vulnerability_id": "VCID-q8jj-uwq7-qubk", "summary": "Multiple vulnerabilities have been found in X.Org Server the worst\n of which could allow a local attacker to replace shared memory segments.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14333", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1417", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14282", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14173", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14485", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14337", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424984", "reference_id": "1424984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424984" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398", "reference_id": "856398", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://security.gentoo.org/glsa/201710-30", "reference_id": "GLSA-201710-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-30" }, { "reference_url": "https://usn.ubuntu.com/3362-1/", "reference_id": "USN-3362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3362-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2017-2624" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8jj-uwq7-qubk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47743?format=api", "vulnerability_id": "VCID-u68a-wdpp-z3eq", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.78998", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.79004", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.7903", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.79015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.79039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.79046", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.7907", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.79055", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.79045", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01218", "scoring_system": "epss", "scoring_elements": "0.79073", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381868", "reference_id": "1381868", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381868" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840440", "reference_id": "840440", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840440" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5646-1/", "reference_id": "USN-5646-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5646-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7945" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u68a-wdpp-z3eq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47749?format=api", "vulnerability_id": "VCID-wzrf-k9px-r3bv", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7946.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77788", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77816", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77827", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77832", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77859", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77843", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77879", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77878", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381869", "reference_id": "1381869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381869" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840440", "reference_id": "840440", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840440" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/5646-1/", "reference_id": "USN-5646-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5646-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77190?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77191?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.1.2-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77192?format=api", "purl": "pkg:ebuild/x11-libs/libXdmcp@1.19.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.19.2" } ], "aliases": [ "CVE-2016-7946" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wzrf-k9px-r3bv" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXdmcp@1.0.9-r1" }