Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/929090?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "libx11", "version": "2:1.8.13-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41702?format=api", "vulnerability_id": "VCID-16w3-mvk5-8bfg", "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n worst of which could allow for remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91599", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07254", "scoring_system": "epss", "scoring_elements": "0.91636", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93458", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93427", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93428", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93447", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11007", "scoring_system": "epss", "scoring_elements": "0.93452", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242", "reference_id": "1623242", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242" }, { "reference_url": "https://security.gentoo.org/glsa/201811-01", "reference_id": "GLSA-201811-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079", "reference_id": "RHSA-2019:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2079" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929097?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-14600" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-16w3-mvk5-8bfg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47741?format=api", "vulnerability_id": "VCID-22vh-wnqm-qqh5", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.8894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88964", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.8899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89002", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89007", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0439", "scoring_system": "epss", "scoring_elements": "0.89003", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861", "reference_id": "1381861", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439", "reference_id": "840439", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929096?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-7943" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49831?format=api", "vulnerability_id": "VCID-6cns-hbja-1bab", "summary": "X.org, libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm are vulnerable\n to local privilege escalations because of unchecked setuid() calls.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4447", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38864", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38996", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39011", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38917", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4447" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447" }, { "reference_url": "https://security.gentoo.org/glsa/200608-25", "reference_id": "GLSA-200608-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-25" }, { "reference_url": "https://security.gentoo.org/glsa/200704-22", "reference_id": "GLSA-200704-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200704-22" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929088?format=api", "purl": "pkg:deb/debian/libx11@2:1.0.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4447" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6cns-hbja-1bab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37952?format=api", "vulnerability_id": "VCID-941j-gajx-1qc9", "summary": "A vulnerability in X.Org X11 library could lead to a Denial of\n Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83844", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83938", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83857", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83873", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83905", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0206", "scoring_system": "epss", "scoring_elements": "0.83915", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822", "reference_id": "1961822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737", "reference_id": "988737", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737" }, { "reference_url": "https://security.archlinux.org/ASA-202105-12", "reference_id": "ASA-202105-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-12" }, { "reference_url": "https://security.archlinux.org/AVG-1968", "reference_id": "AVG-1968", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1968" }, { "reference_url": "https://security.gentoo.org/glsa/202105-16", "reference_id": "GLSA-202105-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3296", "reference_id": "RHSA-2021:3296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3477", "reference_id": "RHSA-2021:3477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4326", "reference_id": "RHSA-2021:4326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4326" }, { "reference_url": "https://usn.ubuntu.com/4966-1/", "reference_id": "USN-4966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4966-1/" }, { "reference_url": "https://usn.ubuntu.com/4966-2/", "reference_id": "USN-4966-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4966-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929100?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-31535" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-941j-gajx-1qc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58827?format=api", "vulnerability_id": "VCID-byet-4t52-1kf5", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27561", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27774", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27616", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27675", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252", "reference_id": "2242252", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43785", "reference_id": "CVE-2023-43785", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-43785" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145", "reference_id": "RHSA-2024:2145", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973", "reference_id": "RHSA-2024:2973", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2973" }, { "reference_url": "https://usn.ubuntu.com/6407-1/", "reference_id": "USN-6407-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-1/" }, { "reference_url": "https://usn.ubuntu.com/6407-2/", "reference_id": "USN-6407-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929104?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-43785" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byet-4t52-1kf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88807?format=api", "vulnerability_id": "VCID-c9rf-ax2v-n7ft", "summary": "CVE-2006-5397 libX11 file descriptor leak", "references": [ { "reference_url": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git%3Ba=commit%3Bh=686bb8b35acf6cecae80fe89b2b5853f5816ce19", "reference_id": "", "reference_type": "", "scores": [], "url": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git%3Ba=commit%3Bh=686bb8b35acf6cecae80fe89b2b5853f5816ce19" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5397.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5397.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5397", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23157", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2313", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23305", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23348", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23137", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23283", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23245", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23187", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23204", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23197", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5397" }, { "reference_url": "https://bugs.freedesktop.org/show_bug.cgi?id=8699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=8699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5397" }, { "reference_url": "http://secunia.com/advisories/22642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22642" }, { "reference_url": "http://secunia.com/advisories/22749", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22749" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29956" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199" }, { "reference_url": "http://www.securityfocus.com/bid/20845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/20845" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/4289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/4289" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=213280", "reference_id": "213280", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213280" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398460", "reference_id": "398460", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5397", "reference_id": "CVE-2006-5397", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5397" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929092?format=api", "purl": "pkg:deb/debian/libx11@2:1.0.3-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-5397" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9rf-ax2v-n7ft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35545?format=api", "vulnerability_id": "VCID-dcgs-qd3h-k7gq", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60313", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60214", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60286", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60266", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60306", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112", "reference_id": "959112", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004", "reference_id": "CVE-2013-2004", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929094?format=api", "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-2004" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55988?format=api", "vulnerability_id": "VCID-e19k-nptv-ffgr", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83061", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.8309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83132", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83128", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83166", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83169", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943", "reference_id": "1209943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/2568-1/", "reference_id": "USN-2568-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2568-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929095?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-7439" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58828?format=api", "vulnerability_id": "VCID-e89b-946w-g7fp", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24414", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24594", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2444", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24499", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24455", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253", "reference_id": "2242253", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43786", "reference_id": "CVE-2023-43786", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-43786" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145", "reference_id": "RHSA-2024:2145", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973", "reference_id": "RHSA-2024:2973", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2973" }, { "reference_url": "https://usn.ubuntu.com/6407-1/", "reference_id": "USN-6407-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-1/" }, { "reference_url": "https://usn.ubuntu.com/6407-2/", "reference_id": "USN-6407-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-2/" }, { "reference_url": "https://usn.ubuntu.com/6408-1/", "reference_id": "USN-6408-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-1/" }, { "reference_url": "https://usn.ubuntu.com/6408-2/", "reference_id": "USN-6408-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929104?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-43786" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e89b-946w-g7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41701?format=api", "vulnerability_id": "VCID-enay-5y1j-ffa4", "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n worst of which could allow for remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82256", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.8231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01708", "scoring_system": "epss", "scoring_elements": "0.82337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82508", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82473", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82468", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01734", "scoring_system": "epss", "scoring_elements": "0.82504", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250", "reference_id": "1623250", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250" }, { "reference_url": "https://security.gentoo.org/glsa/201811-01", "reference_id": "GLSA-201811-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079", "reference_id": "RHSA-2019:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2079" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929097?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-14599" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-enay-5y1j-ffa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35498?format=api", "vulnerability_id": "VCID-j2u9-4cr6-yqcv", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75625", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60120" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040", "reference_id": "959040", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981", "reference_id": "CVE-2013-1981", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929094?format=api", "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-1981" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35527?format=api", "vulnerability_id": "VCID-jz8t-44r3-3yc5", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72648", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72647", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72657", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345", "reference_id": "960345", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997", "reference_id": "CVE-2013-1997", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929094?format=api", "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-1997" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47736?format=api", "vulnerability_id": "VCID-ngsj-tzms-97e8", "summary": "Multiple vulnerabilities have been found in X.Org server and\n libraries, the worse of which allowing local attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89348", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.8935", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89367", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89388", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04712", "scoring_system": "epss", "scoring_elements": "0.89385", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859", "reference_id": "1381859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439", "reference_id": "840439", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439" }, { "reference_url": "https://security.gentoo.org/glsa/201704-03", "reference_id": "GLSA-201704-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201704-03" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929096?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-7942" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41700?format=api", "vulnerability_id": "VCID-npqc-cahn-cfgk", "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n worst of which could allow for remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78032", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.7807", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78053", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78079", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86664", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03035", "scoring_system": "epss", "scoring_elements": "0.86677", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238", "reference_id": "1623238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238" }, { "reference_url": "https://security.gentoo.org/glsa/201811-01", "reference_id": "GLSA-201811-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079", "reference_id": "RHSA-2019:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2079" }, { "reference_url": "https://usn.ubuntu.com/3758-1/", "reference_id": "USN-3758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-1/" }, { "reference_url": "https://usn.ubuntu.com/3758-2/", "reference_id": "USN-3758-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3758-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929097?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-14598" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npqc-cahn-cfgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58829?format=api", "vulnerability_id": "VCID-r53t-w3cp-4kbm", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12695", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12575", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12852", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12657", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12756", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12717", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254", "reference_id": "2242254", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43787", "reference_id": "CVE-2023-43787", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-43787" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145", "reference_id": "RHSA-2024:2145", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973", "reference_id": "RHSA-2024:2973", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2973" }, { "reference_url": "https://usn.ubuntu.com/6407-1/", "reference_id": "USN-6407-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-1/" }, { "reference_url": "https://usn.ubuntu.com/6407-2/", "reference_id": "USN-6407-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6407-2/" }, { "reference_url": "https://usn.ubuntu.com/6408-1/", "reference_id": "USN-6408-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-1/" }, { "reference_url": "https://usn.ubuntu.com/6408-2/", "reference_id": "USN-6408-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6408-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929104?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-43787" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r53t-w3cp-4kbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58826?format=api", "vulnerability_id": "VCID-sujt-svg4-kbfp", "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24061", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23883", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23913", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23922", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23893", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133", "reference_id": "1038133", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748", "reference_id": "2213748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748" }, { "reference_url": "https://security.gentoo.org/glsa/202407-21", "reference_id": "GLSA-202407-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6497", "reference_id": "RHSA-2023:6497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7029", "reference_id": "RHSA-2023:7029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1088", "reference_id": "RHSA-2024:1088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1417", "reference_id": "RHSA-2024:1417", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1417" }, { "reference_url": "https://usn.ubuntu.com/6168-1/", "reference_id": "USN-6168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6168-1/" }, { "reference_url": "https://usn.ubuntu.com/6168-2/", "reference_id": "USN-6168-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6168-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929102?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929101?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929103?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-3138" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sujt-svg4-kbfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59404?format=api", "vulnerability_id": "VCID-tmju-y3w5-z3es", "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35381", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473", "reference_id": "1872473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008", "reference_id": "969008", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008" }, { "reference_url": "https://security.gentoo.org/glsa/202008-18", "reference_id": "GLSA-202008-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4908", "reference_id": "RHSA-2020:4908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4946", "reference_id": "RHSA-2020:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804", "reference_id": "RHSA-2021:1804", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1804" }, { "reference_url": "https://usn.ubuntu.com/4487-1/", "reference_id": "USN-4487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-1/" }, { "reference_url": "https://usn.ubuntu.com/4487-2/", "reference_id": "USN-4487-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929099?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-14363" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59403?format=api", "vulnerability_id": "VCID-tsyg-kprr-67ck", "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3701", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37029", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37104", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37087", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37186", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37215", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37097", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37109", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3712", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37086", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37058", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255", "reference_id": "1862255", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255" }, { "reference_url": "https://security.archlinux.org/AVG-1212", "reference_id": "AVG-1212", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1212" }, { "reference_url": "https://security.gentoo.org/glsa/202008-18", "reference_id": "GLSA-202008-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804", "reference_id": "RHSA-2021:1804", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1804" }, { "reference_url": "https://usn.ubuntu.com/4487-1/", "reference_id": "USN-4487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-1/" }, { "reference_url": "https://usn.ubuntu.com/4487-2/", "reference_id": "USN-4487-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4487-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929098?format=api", "purl": "pkg:deb/debian/libx11@2:1.6.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-14344" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49805?format=api", "vulnerability_id": "VCID-zz57-zmka-33ev", "summary": "The X.Org X11 library contains multiple integer overflows, which could lead\n to the execution of arbitrary code.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045" }, { "reference_url": "http://issues.foresightlinux.org/browse/FL-223", "reference_id": "", "reference_type": "", "scores": [], "url": "http://issues.foresightlinux.org/browse/FL-223" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "reference_url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.8386", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83932", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.8389", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83915", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83938", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02145", "scoring_system": "epss", "scoring_elements": "0.84252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02145", "scoring_system": "epss", "scoring_elements": "0.84247", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1667" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667" }, { "reference_url": "http://secunia.com/advisories/24739", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24739" }, { "reference_url": "http://secunia.com/advisories/24741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24741" }, { "reference_url": "http://secunia.com/advisories/24745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24745" }, { "reference_url": "http://secunia.com/advisories/24756", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24756" }, { "reference_url": "http://secunia.com/advisories/24758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24758" }, { "reference_url": "http://secunia.com/advisories/24765", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24765" }, { "reference_url": "http://secunia.com/advisories/24771", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24771" }, { "reference_url": "http://secunia.com/advisories/24791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24791" }, { "reference_url": "http://secunia.com/advisories/24953", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24953" }, { "reference_url": "http://secunia.com/advisories/24975", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24975" }, { "reference_url": "http://secunia.com/advisories/25004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25004" }, { "reference_url": "http://secunia.com/advisories/25072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25072" }, { "reference_url": "http://secunia.com/advisories/25112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25112" }, { "reference_url": "http://secunia.com/advisories/25131", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25131" }, { "reference_url": "http://secunia.com/advisories/25305", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25305" }, { "reference_url": "http://secunia.com/advisories/25992", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25992" }, { "reference_url": "http://secunia.com/advisories/26177", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26177" }, { "reference_url": "http://secunia.com/advisories/30161", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30161" }, { "reference_url": "http://secunia.com/advisories/33937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33937" }, { "reference_url": "http://secunia.com/advisories/36260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/36260" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-06.xml" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1211" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1213" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1" }, { "reference_url": "http://support.apple.com/kb/HT3438", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3438" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm" }, { "reference_url": "http://www.debian.org/security/2007/dsa-1294", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2007/dsa-1294" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1858", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1858" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_27_x.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_27_x.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html" }, { "reference_url": "http://www.openbsd.org/errata39.html#021_xorg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/errata39.html#021_xorg" }, { "reference_url": "http://www.openbsd.org/errata40.html#011_xorg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/errata40.html#011_xorg" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0157.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0157.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/23300", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/23300" }, { "reference_url": "http://www.securitytracker.com/id?1017864", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1017864" }, { "reference_url": "http://www.ubuntu.com/usn/usn-453-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-453-1" }, { "reference_url": "http://www.ubuntu.com/usn/usn-453-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-453-2" }, { "reference_url": "http://www.ubuntu.com/usn/usn-481-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-481-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1217" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1531", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1531" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=231684", "reference_id": "231684", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=231684" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045", "reference_id": "414045", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862", "reference_id": "417862", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1667", "reference_id": "CVE-2007-1667", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1667" }, { "reference_url": "https://security.gentoo.org/glsa/200705-06", "reference_id": "GLSA-200705-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0125", "reference_id": "RHSA-2007:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0126", "reference_id": "RHSA-2007:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0157", "reference_id": "RHSA-2007:0157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0157" }, { "reference_url": "https://usn.ubuntu.com/453-1/", "reference_id": "USN-453-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/453-1/" }, { "reference_url": "https://usn.ubuntu.com/481-1/", "reference_id": "USN-481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929093?format=api", "purl": "pkg:deb/debian/libx11@2:1.0.3-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-1667" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zz57-zmka-33ev" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" }