Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
Typedeb
Namespacedebian
Namelibx11
Version2:1.8.13-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-16w3-mvk5-8bfg
vulnerability_id VCID-16w3-mvk5-8bfg
summary
Multiple vulnerabilities have been found in X.Org X11 library, the
    worst of which could allow for remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14600
reference_id
reference_type
scores
0
value 0.07254
scoring_system epss
scoring_elements 0.91592
published_at 2026-04-01T12:55:00Z
1
value 0.07254
scoring_system epss
scoring_elements 0.91599
published_at 2026-04-02T12:55:00Z
2
value 0.07254
scoring_system epss
scoring_elements 0.91605
published_at 2026-04-04T12:55:00Z
3
value 0.07254
scoring_system epss
scoring_elements 0.91613
published_at 2026-04-07T12:55:00Z
4
value 0.07254
scoring_system epss
scoring_elements 0.91626
published_at 2026-04-08T12:55:00Z
5
value 0.07254
scoring_system epss
scoring_elements 0.91632
published_at 2026-04-09T12:55:00Z
6
value 0.07254
scoring_system epss
scoring_elements 0.91636
published_at 2026-04-11T12:55:00Z
7
value 0.11007
scoring_system epss
scoring_elements 0.93458
published_at 2026-04-21T12:55:00Z
8
value 0.11007
scoring_system epss
scoring_elements 0.93427
published_at 2026-04-12T12:55:00Z
9
value 0.11007
scoring_system epss
scoring_elements 0.93428
published_at 2026-04-13T12:55:00Z
10
value 0.11007
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-16T12:55:00Z
11
value 0.11007
scoring_system epss
scoring_elements 0.93452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623242
reference_id 1623242
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1623242
5
reference_url https://security.gentoo.org/glsa/201811-01
reference_id GLSA-201811-01
reference_type
scores
url https://security.gentoo.org/glsa/201811-01
6
reference_url https://access.redhat.com/errata/RHSA-2019:2079
reference_id RHSA-2019:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2079
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2018-14600
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16w3-mvk5-8bfg
1
url VCID-22vh-wnqm-qqh5
vulnerability_id VCID-22vh-wnqm-qqh5
summary
Multiple vulnerabilities have been found in X.Org  server and
    libraries, the worse of which allowing local attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7943
reference_id
reference_type
scores
0
value 0.0439
scoring_system epss
scoring_elements 0.8894
published_at 2026-04-01T12:55:00Z
1
value 0.0439
scoring_system epss
scoring_elements 0.88948
published_at 2026-04-02T12:55:00Z
2
value 0.0439
scoring_system epss
scoring_elements 0.88964
published_at 2026-04-04T12:55:00Z
3
value 0.0439
scoring_system epss
scoring_elements 0.88967
published_at 2026-04-07T12:55:00Z
4
value 0.0439
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-08T12:55:00Z
5
value 0.0439
scoring_system epss
scoring_elements 0.8899
published_at 2026-04-09T12:55:00Z
6
value 0.0439
scoring_system epss
scoring_elements 0.89002
published_at 2026-04-11T12:55:00Z
7
value 0.0439
scoring_system epss
scoring_elements 0.88997
published_at 2026-04-12T12:55:00Z
8
value 0.0439
scoring_system epss
scoring_elements 0.88995
published_at 2026-04-13T12:55:00Z
9
value 0.0439
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-16T12:55:00Z
10
value 0.0439
scoring_system epss
scoring_elements 0.89007
published_at 2026-04-18T12:55:00Z
11
value 0.0439
scoring_system epss
scoring_elements 0.89003
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1381861
reference_id 1381861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1381861
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
reference_id 840439
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
5
reference_url https://security.gentoo.org/glsa/201704-03
reference_id GLSA-201704-03
reference_type
scores
url https://security.gentoo.org/glsa/201704-03
6
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
7
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2016-7943
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5
2
url VCID-6cns-hbja-1bab
vulnerability_id VCID-6cns-hbja-1bab
summary
X.org, libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm are vulnerable
    to local privilege escalations because of unchecked setuid() calls.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4447
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38864
published_at 2026-04-01T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38996
published_at 2026-04-02T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.39016
published_at 2026-04-04T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38947
published_at 2026-04-07T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.39
published_at 2026-04-08T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.39014
published_at 2026-04-09T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.39027
published_at 2026-04-11T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38991
published_at 2026-04-18T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.38964
published_at 2026-04-13T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.39011
published_at 2026-04-16T12:55:00Z
10
value 0.00175
scoring_system epss
scoring_elements 0.38917
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447
3
reference_url https://security.gentoo.org/glsa/200608-25
reference_id GLSA-200608-25
reference_type
scores
url https://security.gentoo.org/glsa/200608-25
4
reference_url https://security.gentoo.org/glsa/200704-22
reference_id GLSA-200704-22
reference_type
scores
url https://security.gentoo.org/glsa/200704-22
fixed_packages
0
url pkg:deb/debian/libx11@2:1.0.0-7?distro=trixie
purl pkg:deb/debian/libx11@2:1.0.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.0-7%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2006-4447
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cns-hbja-1bab
3
url VCID-941j-gajx-1qc9
vulnerability_id VCID-941j-gajx-1qc9
summary
A vulnerability in X.Org X11 library could lead to a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31535
reference_id
reference_type
scores
0
value 0.0206
scoring_system epss
scoring_elements 0.83844
published_at 2026-04-01T12:55:00Z
1
value 0.0206
scoring_system epss
scoring_elements 0.83938
published_at 2026-04-21T12:55:00Z
2
value 0.0206
scoring_system epss
scoring_elements 0.83911
published_at 2026-04-13T12:55:00Z
3
value 0.0206
scoring_system epss
scoring_elements 0.83937
published_at 2026-04-16T12:55:00Z
4
value 0.0206
scoring_system epss
scoring_elements 0.83857
published_at 2026-04-02T12:55:00Z
5
value 0.0206
scoring_system epss
scoring_elements 0.83873
published_at 2026-04-04T12:55:00Z
6
value 0.0206
scoring_system epss
scoring_elements 0.83875
published_at 2026-04-07T12:55:00Z
7
value 0.0206
scoring_system epss
scoring_elements 0.83898
published_at 2026-04-08T12:55:00Z
8
value 0.0206
scoring_system epss
scoring_elements 0.83905
published_at 2026-04-09T12:55:00Z
9
value 0.0206
scoring_system epss
scoring_elements 0.83921
published_at 2026-04-11T12:55:00Z
10
value 0.0206
scoring_system epss
scoring_elements 0.83915
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31535
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1961822
reference_id 1961822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1961822
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737
reference_id 988737
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737
6
reference_url https://security.archlinux.org/ASA-202105-12
reference_id ASA-202105-12
reference_type
scores
url https://security.archlinux.org/ASA-202105-12
7
reference_url https://security.archlinux.org/AVG-1968
reference_id AVG-1968
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1968
8
reference_url https://security.gentoo.org/glsa/202105-16
reference_id GLSA-202105-16
reference_type
scores
url https://security.gentoo.org/glsa/202105-16
9
reference_url https://access.redhat.com/errata/RHSA-2021:3296
reference_id RHSA-2021:3296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3296
10
reference_url https://access.redhat.com/errata/RHSA-2021:3477
reference_id RHSA-2021:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3477
11
reference_url https://access.redhat.com/errata/RHSA-2021:4326
reference_id RHSA-2021:4326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4326
12
reference_url https://usn.ubuntu.com/4966-1/
reference_id USN-4966-1
reference_type
scores
url https://usn.ubuntu.com/4966-1/
13
reference_url https://usn.ubuntu.com/4966-2/
reference_id USN-4966-2
reference_type
scores
url https://usn.ubuntu.com/4966-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.1-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.1-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2021-31535
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-941j-gajx-1qc9
4
url VCID-byet-4t52-1kf5
vulnerability_id VCID-byet-4t52-1kf5
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43785
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27561
published_at 2026-04-21T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27774
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27616
published_at 2026-04-13T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27626
published_at 2026-04-16T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.276
published_at 2026-04-18T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27812
published_at 2026-04-04T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27604
published_at 2026-04-07T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.2767
published_at 2026-04-08T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27714
published_at 2026-04-09T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27718
published_at 2026-04-11T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43785
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242252
reference_id 2242252
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242252
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://access.redhat.com/security/cve/CVE-2023-43785
reference_id CVE-2023-43785
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://access.redhat.com/security/cve/CVE-2023-43785
12
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
13
reference_url https://access.redhat.com/errata/RHSA-2024:2145
reference_id RHSA-2024:2145
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://access.redhat.com/errata/RHSA-2024:2145
14
reference_url https://access.redhat.com/errata/RHSA-2024:2973
reference_id RHSA-2024:2973
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/
url https://access.redhat.com/errata/RHSA-2024:2973
15
reference_url https://usn.ubuntu.com/6407-1/
reference_id USN-6407-1
reference_type
scores
url https://usn.ubuntu.com/6407-1/
16
reference_url https://usn.ubuntu.com/6407-2/
reference_id USN-6407-2
reference_type
scores
url https://usn.ubuntu.com/6407-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2023-43785
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byet-4t52-1kf5
5
url VCID-c9rf-ax2v-n7ft
vulnerability_id VCID-c9rf-ax2v-n7ft
summary CVE-2006-5397 libX11 file descriptor leak
references
0
reference_url http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git%3Ba=commit%3Bh=686bb8b35acf6cecae80fe89b2b5853f5816ce19
reference_id
reference_type
scores
url http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git%3Ba=commit%3Bh=686bb8b35acf6cecae80fe89b2b5853f5816ce19
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5397.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5397.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5397
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23157
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.2313
published_at 2026-04-01T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23305
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23348
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23137
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.2321
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23261
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23283
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23245
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23187
published_at 2026-04-13T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23204
published_at 2026-04-16T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23197
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5397
3
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=8699
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=8699
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5397
5
reference_url http://secunia.com/advisories/22642
reference_id
reference_type
scores
url http://secunia.com/advisories/22642
6
reference_url http://secunia.com/advisories/22749
reference_id
reference_type
scores
url http://secunia.com/advisories/22749
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/29956
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/29956
8
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:199
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:199
9
reference_url http://www.securityfocus.com/bid/20845
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/20845
10
reference_url http://www.vupen.com/english/advisories/2006/4289
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4289
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=213280
reference_id 213280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=213280
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398460
reference_id 398460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398460
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-5397
reference_id CVE-2006-5397
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2006-5397
fixed_packages
0
url pkg:deb/debian/libx11@2:1.0.3-3?distro=trixie
purl pkg:deb/debian/libx11@2:1.0.3-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-3%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2006-5397
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9rf-ax2v-n7ft
6
url VCID-dcgs-qd3h-k7gq
vulnerability_id VCID-dcgs-qd3h-k7gq
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2004
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60313
published_at 2026-04-18T12:55:00Z
1
value 0.00393
scoring_system epss
scoring_elements 0.60145
published_at 2026-04-01T12:55:00Z
2
value 0.00393
scoring_system epss
scoring_elements 0.60221
published_at 2026-04-02T12:55:00Z
3
value 0.00393
scoring_system epss
scoring_elements 0.60247
published_at 2026-04-04T12:55:00Z
4
value 0.00393
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-07T12:55:00Z
5
value 0.00393
scoring_system epss
scoring_elements 0.60264
published_at 2026-04-08T12:55:00Z
6
value 0.00393
scoring_system epss
scoring_elements 0.60278
published_at 2026-04-09T12:55:00Z
7
value 0.00393
scoring_system epss
scoring_elements 0.60299
published_at 2026-04-21T12:55:00Z
8
value 0.00393
scoring_system epss
scoring_elements 0.60286
published_at 2026-04-12T12:55:00Z
9
value 0.00393
scoring_system epss
scoring_elements 0.60266
published_at 2026-04-13T12:55:00Z
10
value 0.00393
scoring_system epss
scoring_elements 0.60306
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2004
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
5
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959112
reference_id 959112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959112
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2004
reference_id CVE-2013-2004
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2004
13
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
14
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
15
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2013-2004
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq
7
url VCID-e19k-nptv-ffgr
vulnerability_id VCID-e19k-nptv-ffgr
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
reference_id
reference_type
scores
0
value 0.01877
scoring_system epss
scoring_elements 0.83061
published_at 2026-04-01T12:55:00Z
1
value 0.01877
scoring_system epss
scoring_elements 0.83077
published_at 2026-04-02T12:55:00Z
2
value 0.01877
scoring_system epss
scoring_elements 0.83091
published_at 2026-04-04T12:55:00Z
3
value 0.01877
scoring_system epss
scoring_elements 0.8309
published_at 2026-04-07T12:55:00Z
4
value 0.01877
scoring_system epss
scoring_elements 0.83114
published_at 2026-04-08T12:55:00Z
5
value 0.01877
scoring_system epss
scoring_elements 0.83122
published_at 2026-04-09T12:55:00Z
6
value 0.01877
scoring_system epss
scoring_elements 0.83138
published_at 2026-04-11T12:55:00Z
7
value 0.01877
scoring_system epss
scoring_elements 0.83132
published_at 2026-04-12T12:55:00Z
8
value 0.01877
scoring_system epss
scoring_elements 0.83128
published_at 2026-04-13T12:55:00Z
9
value 0.01877
scoring_system epss
scoring_elements 0.83165
published_at 2026-04-16T12:55:00Z
10
value 0.01877
scoring_system epss
scoring_elements 0.83166
published_at 2026-04-18T12:55:00Z
11
value 0.01877
scoring_system epss
scoring_elements 0.83169
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
reference_id 1209943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
4
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
5
reference_url https://usn.ubuntu.com/2568-1/
reference_id USN-2568-1
reference_type
scores
url https://usn.ubuntu.com/2568-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.0-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.0-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2013-7439
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr
8
url VCID-e89b-946w-g7fp
vulnerability_id VCID-e89b-946w-g7fp
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43786
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24377
published_at 2026-04-21T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24557
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24398
published_at 2026-04-13T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24414
published_at 2026-04-16T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24406
published_at 2026-04-18T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24594
published_at 2026-04-04T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24371
published_at 2026-04-07T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.2444
published_at 2026-04-08T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24485
published_at 2026-04-09T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24499
published_at 2026-04-11T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24455
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43786
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242253
reference_id 2242253
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242253
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://access.redhat.com/security/cve/CVE-2023-43786
reference_id CVE-2023-43786
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://access.redhat.com/security/cve/CVE-2023-43786
12
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
13
reference_url https://access.redhat.com/errata/RHSA-2024:2145
reference_id RHSA-2024:2145
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://access.redhat.com/errata/RHSA-2024:2145
14
reference_url https://access.redhat.com/errata/RHSA-2024:2973
reference_id RHSA-2024:2973
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/
url https://access.redhat.com/errata/RHSA-2024:2973
15
reference_url https://usn.ubuntu.com/6407-1/
reference_id USN-6407-1
reference_type
scores
url https://usn.ubuntu.com/6407-1/
16
reference_url https://usn.ubuntu.com/6407-2/
reference_id USN-6407-2
reference_type
scores
url https://usn.ubuntu.com/6407-2/
17
reference_url https://usn.ubuntu.com/6408-1/
reference_id USN-6408-1
reference_type
scores
url https://usn.ubuntu.com/6408-1/
18
reference_url https://usn.ubuntu.com/6408-2/
reference_id USN-6408-2
reference_type
scores
url https://usn.ubuntu.com/6408-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2023-43786
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e89b-946w-g7fp
9
url VCID-enay-5y1j-ffa4
vulnerability_id VCID-enay-5y1j-ffa4
summary
Multiple vulnerabilities have been found in X.Org X11 library, the
    worst of which could allow for remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14599
reference_id
reference_type
scores
0
value 0.01708
scoring_system epss
scoring_elements 0.82256
published_at 2026-04-01T12:55:00Z
1
value 0.01708
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-02T12:55:00Z
2
value 0.01708
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-04T12:55:00Z
3
value 0.01708
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-07T12:55:00Z
4
value 0.01708
scoring_system epss
scoring_elements 0.8231
published_at 2026-04-08T12:55:00Z
5
value 0.01708
scoring_system epss
scoring_elements 0.82317
published_at 2026-04-09T12:55:00Z
6
value 0.01708
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-11T12:55:00Z
7
value 0.01734
scoring_system epss
scoring_elements 0.82508
published_at 2026-04-21T12:55:00Z
8
value 0.01734
scoring_system epss
scoring_elements 0.82473
published_at 2026-04-12T12:55:00Z
9
value 0.01734
scoring_system epss
scoring_elements 0.82468
published_at 2026-04-13T12:55:00Z
10
value 0.01734
scoring_system epss
scoring_elements 0.82504
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623250
reference_id 1623250
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1623250
5
reference_url https://security.gentoo.org/glsa/201811-01
reference_id GLSA-201811-01
reference_type
scores
url https://security.gentoo.org/glsa/201811-01
6
reference_url https://access.redhat.com/errata/RHSA-2019:2079
reference_id RHSA-2019:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2079
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2018-14599
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-enay-5y1j-ffa4
10
url VCID-j2u9-4cr6-yqcv
vulnerability_id VCID-j2u9-4cr6-yqcv
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1981
reference_id
reference_type
scores
0
value 0.00894
scoring_system epss
scoring_elements 0.75629
published_at 2026-04-18T12:55:00Z
1
value 0.00894
scoring_system epss
scoring_elements 0.75524
published_at 2026-04-01T12:55:00Z
2
value 0.00894
scoring_system epss
scoring_elements 0.75526
published_at 2026-04-02T12:55:00Z
3
value 0.00894
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-04T12:55:00Z
4
value 0.00894
scoring_system epss
scoring_elements 0.75536
published_at 2026-04-07T12:55:00Z
5
value 0.00894
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-08T12:55:00Z
6
value 0.00894
scoring_system epss
scoring_elements 0.75588
published_at 2026-04-13T12:55:00Z
7
value 0.00894
scoring_system epss
scoring_elements 0.75613
published_at 2026-04-21T12:55:00Z
8
value 0.00894
scoring_system epss
scoring_elements 0.75595
published_at 2026-04-12T12:55:00Z
9
value 0.00894
scoring_system epss
scoring_elements 0.75625
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
6
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.securityfocus.com/bid/60120
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60120
9
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
10
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959040
reference_id 959040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959040
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1981
reference_id CVE-2013-1981
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1981
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2013-1981
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv
11
url VCID-jz8t-44r3-3yc5
vulnerability_id VCID-jz8t-44r3-3yc5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1997
reference_id
reference_type
scores
0
value 0.00727
scoring_system epss
scoring_elements 0.72648
published_at 2026-04-21T12:55:00Z
1
value 0.00727
scoring_system epss
scoring_elements 0.72558
published_at 2026-04-01T12:55:00Z
2
value 0.00727
scoring_system epss
scoring_elements 0.72566
published_at 2026-04-02T12:55:00Z
3
value 0.00727
scoring_system epss
scoring_elements 0.72582
published_at 2026-04-04T12:55:00Z
4
value 0.00727
scoring_system epss
scoring_elements 0.72559
published_at 2026-04-07T12:55:00Z
5
value 0.00727
scoring_system epss
scoring_elements 0.72597
published_at 2026-04-08T12:55:00Z
6
value 0.00727
scoring_system epss
scoring_elements 0.72609
published_at 2026-04-09T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72633
published_at 2026-04-11T12:55:00Z
8
value 0.00727
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-12T12:55:00Z
9
value 0.00727
scoring_system epss
scoring_elements 0.72605
published_at 2026-04-13T12:55:00Z
10
value 0.00727
scoring_system epss
scoring_elements 0.72647
published_at 2026-04-16T12:55:00Z
11
value 0.00727
scoring_system epss
scoring_elements 0.72657
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1997
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
6
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960345
reference_id 960345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960345
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1997
reference_id CVE-2013-1997
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1997
14
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
15
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
16
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2013-1997
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5
12
url VCID-ngsj-tzms-97e8
vulnerability_id VCID-ngsj-tzms-97e8
summary
Multiple vulnerabilities have been found in X.Org  server and
    libraries, the worse of which allowing local attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7942
reference_id
reference_type
scores
0
value 0.04712
scoring_system epss
scoring_elements 0.89332
published_at 2026-04-01T12:55:00Z
1
value 0.04712
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-02T12:55:00Z
2
value 0.04712
scoring_system epss
scoring_elements 0.89348
published_at 2026-04-04T12:55:00Z
3
value 0.04712
scoring_system epss
scoring_elements 0.8935
published_at 2026-04-07T12:55:00Z
4
value 0.04712
scoring_system epss
scoring_elements 0.89367
published_at 2026-04-08T12:55:00Z
5
value 0.04712
scoring_system epss
scoring_elements 0.89371
published_at 2026-04-09T12:55:00Z
6
value 0.04712
scoring_system epss
scoring_elements 0.8938
published_at 2026-04-11T12:55:00Z
7
value 0.04712
scoring_system epss
scoring_elements 0.89377
published_at 2026-04-12T12:55:00Z
8
value 0.04712
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-13T12:55:00Z
9
value 0.04712
scoring_system epss
scoring_elements 0.89388
published_at 2026-04-18T12:55:00Z
10
value 0.04712
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1381859
reference_id 1381859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1381859
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
reference_id 840439
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439
6
reference_url https://security.gentoo.org/glsa/201704-03
reference_id GLSA-201704-03
reference_type
scores
url https://security.gentoo.org/glsa/201704-03
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2016-7942
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8
13
url VCID-npqc-cahn-cfgk
vulnerability_id VCID-npqc-cahn-cfgk
summary
Multiple vulnerabilities have been found in X.Org X11 library, the
    worst of which could allow for remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14598
reference_id
reference_type
scores
0
value 0.01105
scoring_system epss
scoring_elements 0.78032
published_at 2026-04-01T12:55:00Z
1
value 0.01105
scoring_system epss
scoring_elements 0.78041
published_at 2026-04-02T12:55:00Z
2
value 0.01105
scoring_system epss
scoring_elements 0.7807
published_at 2026-04-04T12:55:00Z
3
value 0.01105
scoring_system epss
scoring_elements 0.78053
published_at 2026-04-07T12:55:00Z
4
value 0.01105
scoring_system epss
scoring_elements 0.78079
published_at 2026-04-08T12:55:00Z
5
value 0.01105
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-09T12:55:00Z
6
value 0.01105
scoring_system epss
scoring_elements 0.78109
published_at 2026-04-11T12:55:00Z
7
value 0.03035
scoring_system epss
scoring_elements 0.86683
published_at 2026-04-18T12:55:00Z
8
value 0.03035
scoring_system epss
scoring_elements 0.86671
published_at 2026-04-12T12:55:00Z
9
value 0.03035
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-13T12:55:00Z
10
value 0.03035
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623238
reference_id 1623238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1623238
5
reference_url https://security.gentoo.org/glsa/201811-01
reference_id GLSA-201811-01
reference_type
scores
url https://security.gentoo.org/glsa/201811-01
6
reference_url https://access.redhat.com/errata/RHSA-2019:2079
reference_id RHSA-2019:2079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2079
7
reference_url https://usn.ubuntu.com/3758-1/
reference_id USN-3758-1
reference_type
scores
url https://usn.ubuntu.com/3758-1/
8
reference_url https://usn.ubuntu.com/3758-2/
reference_id USN-3758-2
reference_type
scores
url https://usn.ubuntu.com/3758-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2018-14598
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npqc-cahn-cfgk
14
url VCID-r53t-w3cp-4kbm
vulnerability_id VCID-r53t-w3cp-4kbm
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43787
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12695
published_at 2026-04-21T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12804
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12669
published_at 2026-04-13T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12575
published_at 2026-04-16T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12586
published_at 2026-04-18T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12852
published_at 2026-04-04T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12657
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12736
published_at 2026-04-08T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12787
published_at 2026-04-09T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12756
published_at 2026-04-11T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12717
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43787
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242254
reference_id 2242254
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242254
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://access.redhat.com/security/cve/CVE-2023-43787
reference_id CVE-2023-43787
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://access.redhat.com/security/cve/CVE-2023-43787
12
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
13
reference_url https://access.redhat.com/errata/RHSA-2024:2145
reference_id RHSA-2024:2145
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://access.redhat.com/errata/RHSA-2024:2145
14
reference_url https://access.redhat.com/errata/RHSA-2024:2973
reference_id RHSA-2024:2973
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/
url https://access.redhat.com/errata/RHSA-2024:2973
15
reference_url https://usn.ubuntu.com/6407-1/
reference_id USN-6407-1
reference_type
scores
url https://usn.ubuntu.com/6407-1/
16
reference_url https://usn.ubuntu.com/6407-2/
reference_id USN-6407-2
reference_type
scores
url https://usn.ubuntu.com/6407-2/
17
reference_url https://usn.ubuntu.com/6408-1/
reference_id USN-6408-1
reference_type
scores
url https://usn.ubuntu.com/6408-1/
18
reference_url https://usn.ubuntu.com/6408-2/
reference_id USN-6408-2
reference_type
scores
url https://usn.ubuntu.com/6408-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2023-43787
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r53t-w3cp-4kbm
15
url VCID-sujt-svg4-kbfp
vulnerability_id VCID-sujt-svg4-kbfp
summary Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3138
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24061
published_at 2026-04-02T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.241
published_at 2026-04-04T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23883
published_at 2026-04-07T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23949
published_at 2026-04-08T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23995
published_at 2026-04-09T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.24012
published_at 2026-04-11T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.23969
published_at 2026-04-12T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23913
published_at 2026-04-13T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23922
published_at 2026-04-16T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23911
published_at 2026-04-18T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23893
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133
reference_id 1038133
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213748
reference_id 2213748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213748
6
reference_url https://security.gentoo.org/glsa/202407-21
reference_id GLSA-202407-21
reference_type
scores
url https://security.gentoo.org/glsa/202407-21
7
reference_url https://access.redhat.com/errata/RHSA-2023:6497
reference_id RHSA-2023:6497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6497
8
reference_url https://access.redhat.com/errata/RHSA-2023:7029
reference_id RHSA-2023:7029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7029
9
reference_url https://access.redhat.com/errata/RHSA-2024:1088
reference_id RHSA-2024:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1088
10
reference_url https://access.redhat.com/errata/RHSA-2024:1417
reference_id RHSA-2024:1417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1417
11
reference_url https://usn.ubuntu.com/6168-1/
reference_id USN-6168-1
reference_type
scores
url https://usn.ubuntu.com/6168-1/
12
reference_url https://usn.ubuntu.com/6168-2/
reference_id USN-6168-2
reference_type
scores
url https://usn.ubuntu.com/6168-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.6-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.6-1%3Fdistro=trixie
5
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
6
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2023-3138
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sujt-svg4-kbfp
16
url VCID-tmju-y3w5-z3es
vulnerability_id VCID-tmju-y3w5-z3es
summary
Multiple vulnerabilities have been found in X.org X11 library, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14363
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35381
published_at 2026-04-01T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.3558
published_at 2026-04-02T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35606
published_at 2026-04-04T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35488
published_at 2026-04-07T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35534
published_at 2026-04-08T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35559
published_at 2026-04-09T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35568
published_at 2026-04-11T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35523
published_at 2026-04-12T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35501
published_at 2026-04-13T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35541
published_at 2026-04-16T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35531
published_at 2026-04-18T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.3548
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872473
reference_id 1872473
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872473
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008
reference_id 969008
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008
6
reference_url https://security.gentoo.org/glsa/202008-18
reference_id GLSA-202008-18
reference_type
scores
url https://security.gentoo.org/glsa/202008-18
7
reference_url https://access.redhat.com/errata/RHSA-2020:4908
reference_id RHSA-2020:4908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4908
8
reference_url https://access.redhat.com/errata/RHSA-2020:4946
reference_id RHSA-2020:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4946
9
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
10
reference_url https://usn.ubuntu.com/4487-1/
reference_id USN-4487-1
reference_type
scores
url https://usn.ubuntu.com/4487-1/
11
reference_url https://usn.ubuntu.com/4487-2/
reference_id USN-4487-2
reference_type
scores
url https://usn.ubuntu.com/4487-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.12-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2020-14363
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es
17
url VCID-tsyg-kprr-67ck
vulnerability_id VCID-tsyg-kprr-67ck
summary
Multiple vulnerabilities have been found in X.org X11 library, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14344
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.3701
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37029
published_at 2026-04-21T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37104
published_at 2026-04-16T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37087
published_at 2026-04-18T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37186
published_at 2026-04-02T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37215
published_at 2026-04-04T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37046
published_at 2026-04-07T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37097
published_at 2026-04-08T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37109
published_at 2026-04-09T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.3712
published_at 2026-04-11T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37086
published_at 2026-04-12T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.37058
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862255
reference_id 1862255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862255
5
reference_url https://security.archlinux.org/AVG-1212
reference_id AVG-1212
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1212
6
reference_url https://security.gentoo.org/glsa/202008-18
reference_id GLSA-202008-18
reference_type
scores
url https://security.gentoo.org/glsa/202008-18
7
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
8
reference_url https://usn.ubuntu.com/4487-1/
reference_id USN-4487-1
reference_type
scores
url https://usn.ubuntu.com/4487-1/
9
reference_url https://usn.ubuntu.com/4487-2/
reference_id USN-4487-2
reference_type
scores
url https://usn.ubuntu.com/4487-2/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.6.10-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.6.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.10-1%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2020-14344
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck
18
url VCID-zz57-zmka-33ev
vulnerability_id VCID-zz57-zmka-33ev
summary
The X.Org X11 library contains multiple integer overflows, which could lead
    to the execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
1
reference_url http://issues.foresightlinux.org/browse/FL-223
reference_id
reference_type
scores
url http://issues.foresightlinux.org/browse/FL-223
2
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
3
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2007-0125.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0125.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1667
reference_id
reference_type
scores
0
value 0.02066
scoring_system epss
scoring_elements 0.8386
published_at 2026-04-01T12:55:00Z
1
value 0.02066
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-12T12:55:00Z
2
value 0.02066
scoring_system epss
scoring_elements 0.83929
published_at 2026-04-13T12:55:00Z
3
value 0.02066
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-16T12:55:00Z
4
value 0.02066
scoring_system epss
scoring_elements 0.83874
published_at 2026-04-02T12:55:00Z
5
value 0.02066
scoring_system epss
scoring_elements 0.8389
published_at 2026-04-04T12:55:00Z
6
value 0.02066
scoring_system epss
scoring_elements 0.83892
published_at 2026-04-07T12:55:00Z
7
value 0.02066
scoring_system epss
scoring_elements 0.83915
published_at 2026-04-08T12:55:00Z
8
value 0.02066
scoring_system epss
scoring_elements 0.83922
published_at 2026-04-09T12:55:00Z
9
value 0.02066
scoring_system epss
scoring_elements 0.83938
published_at 2026-04-11T12:55:00Z
10
value 0.02145
scoring_system epss
scoring_elements 0.84252
published_at 2026-04-21T12:55:00Z
11
value 0.02145
scoring_system epss
scoring_elements 0.84247
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1667
7
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667
9
reference_url http://secunia.com/advisories/24739
reference_id
reference_type
scores
url http://secunia.com/advisories/24739
10
reference_url http://secunia.com/advisories/24741
reference_id
reference_type
scores
url http://secunia.com/advisories/24741
11
reference_url http://secunia.com/advisories/24745
reference_id
reference_type
scores
url http://secunia.com/advisories/24745
12
reference_url http://secunia.com/advisories/24756
reference_id
reference_type
scores
url http://secunia.com/advisories/24756
13
reference_url http://secunia.com/advisories/24758
reference_id
reference_type
scores
url http://secunia.com/advisories/24758
14
reference_url http://secunia.com/advisories/24765
reference_id
reference_type
scores
url http://secunia.com/advisories/24765
15
reference_url http://secunia.com/advisories/24771
reference_id
reference_type
scores
url http://secunia.com/advisories/24771
16
reference_url http://secunia.com/advisories/24791
reference_id
reference_type
scores
url http://secunia.com/advisories/24791
17
reference_url http://secunia.com/advisories/24953
reference_id
reference_type
scores
url http://secunia.com/advisories/24953
18
reference_url http://secunia.com/advisories/24975
reference_id
reference_type
scores
url http://secunia.com/advisories/24975
19
reference_url http://secunia.com/advisories/25004
reference_id
reference_type
scores
url http://secunia.com/advisories/25004
20
reference_url http://secunia.com/advisories/25072
reference_id
reference_type
scores
url http://secunia.com/advisories/25072
21
reference_url http://secunia.com/advisories/25112
reference_id
reference_type
scores
url http://secunia.com/advisories/25112
22
reference_url http://secunia.com/advisories/25131
reference_id
reference_type
scores
url http://secunia.com/advisories/25131
23
reference_url http://secunia.com/advisories/25305
reference_id
reference_type
scores
url http://secunia.com/advisories/25305
24
reference_url http://secunia.com/advisories/25992
reference_id
reference_type
scores
url http://secunia.com/advisories/25992
25
reference_url http://secunia.com/advisories/26177
reference_id
reference_type
scores
url http://secunia.com/advisories/26177
26
reference_url http://secunia.com/advisories/30161
reference_id
reference_type
scores
url http://secunia.com/advisories/30161
27
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
28
reference_url http://secunia.com/advisories/36260
reference_id
reference_type
scores
url http://secunia.com/advisories/36260
29
reference_url http://security.gentoo.org/glsa/glsa-200705-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-06.xml
30
reference_url https://issues.rpath.com/browse/RPL-1211
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1211
31
reference_url https://issues.rpath.com/browse/RPL-1213
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1213
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776
34
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1
35
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm
37
reference_url http://www.debian.org/security/2007/dsa-1294
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1294
38
reference_url http://www.debian.org/security/2009/dsa-1858
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1858
39
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
40
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
41
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
42
reference_url http://www.novell.com/linux/security/advisories/2007_27_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_27_x.html
43
reference_url http://www.novell.com/linux/security/advisories/2007_8_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_8_sr.html
44
reference_url http://www.openbsd.org/errata39.html#021_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata39.html#021_xorg
45
reference_url http://www.openbsd.org/errata40.html#011_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata40.html#011_xorg
46
reference_url http://www.redhat.com/support/errata/RHSA-2007-0126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0126.html
47
reference_url http://www.redhat.com/support/errata/RHSA-2007-0157.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0157.html
48
reference_url http://www.securityfocus.com/archive/1/464686/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464686/100/0/threaded
49
reference_url http://www.securityfocus.com/archive/1/464816/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464816/100/0/threaded
50
reference_url http://www.securityfocus.com/bid/23300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23300
51
reference_url http://www.securitytracker.com/id?1017864
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017864
52
reference_url http://www.ubuntu.com/usn/usn-453-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-453-1
53
reference_url http://www.ubuntu.com/usn/usn-453-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-453-2
54
reference_url http://www.ubuntu.com/usn/usn-481-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-481-1
55
reference_url http://www.vupen.com/english/advisories/2007/1217
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1217
56
reference_url http://www.vupen.com/english/advisories/2007/1531
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1531
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=231684
reference_id 231684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=231684
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
reference_id 414045
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862
reference_id 417862
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1667
reference_id CVE-2007-1667
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1667
67
reference_url https://security.gentoo.org/glsa/200705-06
reference_id GLSA-200705-06
reference_type
scores
url https://security.gentoo.org/glsa/200705-06
68
reference_url https://access.redhat.com/errata/RHSA-2007:0125
reference_id RHSA-2007:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0125
69
reference_url https://access.redhat.com/errata/RHSA-2007:0126
reference_id RHSA-2007:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0126
70
reference_url https://access.redhat.com/errata/RHSA-2007:0157
reference_id RHSA-2007:0157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0157
71
reference_url https://usn.ubuntu.com/453-1/
reference_id USN-453-1
reference_type
scores
url https://usn.ubuntu.com/453-1/
72
reference_url https://usn.ubuntu.com/481-1/
reference_id USN-481-1
reference_type
scores
url https://usn.ubuntu.com/481-1/
fixed_packages
0
url pkg:deb/debian/libx11@2:1.0.3-7?distro=trixie
purl pkg:deb/debian/libx11@2:1.0.3-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-7%3Fdistro=trixie
1
url pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
purl pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie
aliases CVE-2007-1667
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zz57-zmka-33ev
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie