Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
Typedeb
Namespacedebian
Namelibxfont
Version1:2.0.6-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:2.0.6-2
Latest_non_vulnerable_version1:2.0.6-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-19c4-kwxh-kybw
vulnerability_id VCID-19c4-kwxh-kybw
summary
Multiple vulnerabilities have been found in libXfont, the worst of
    which could result in execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1804.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1804
reference_id
reference_type
scores
0
value 0.02304
scoring_system epss
scoring_elements 0.84673
published_at 2026-04-01T12:55:00Z
1
value 0.02304
scoring_system epss
scoring_elements 0.84689
published_at 2026-04-02T12:55:00Z
2
value 0.02304
scoring_system epss
scoring_elements 0.84709
published_at 2026-04-04T12:55:00Z
3
value 0.02304
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-07T12:55:00Z
4
value 0.02304
scoring_system epss
scoring_elements 0.84733
published_at 2026-04-08T12:55:00Z
5
value 0.02304
scoring_system epss
scoring_elements 0.8474
published_at 2026-04-09T12:55:00Z
6
value 0.02304
scoring_system epss
scoring_elements 0.84758
published_at 2026-04-11T12:55:00Z
7
value 0.02304
scoring_system epss
scoring_elements 0.84753
published_at 2026-04-12T12:55:00Z
8
value 0.02304
scoring_system epss
scoring_elements 0.84747
published_at 2026-04-13T12:55:00Z
9
value 0.02304
scoring_system epss
scoring_elements 0.84769
published_at 2026-04-16T12:55:00Z
10
value 0.02304
scoring_system epss
scoring_elements 0.8477
published_at 2026-04-18T12:55:00Z
11
value 0.02304
scoring_system epss
scoring_elements 0.84768
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1804
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1203719
reference_id 1203719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1203719
6
reference_url https://security.gentoo.org/glsa/201507-21
reference_id GLSA-201507-21
reference_type
scores
url https://security.gentoo.org/glsa/201507-21
7
reference_url https://access.redhat.com/errata/RHSA-2015:1708
reference_id RHSA-2015:1708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1708
8
reference_url https://usn.ubuntu.com/2536-1/
reference_id USN-2536-1
reference_type
scores
url https://usn.ubuntu.com/2536-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.5.1-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2015-1804
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-19c4-kwxh-kybw
1
url VCID-2w1u-kcvp-rygj
vulnerability_id VCID-2w1u-kcvp-rygj
summary
Multiple vulnerabilities have been found in libXfont, the worst of
    which could result in execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1802.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1802
reference_id
reference_type
scores
0
value 0.01759
scoring_system epss
scoring_elements 0.82534
published_at 2026-04-01T12:55:00Z
1
value 0.01759
scoring_system epss
scoring_elements 0.82547
published_at 2026-04-02T12:55:00Z
2
value 0.01759
scoring_system epss
scoring_elements 0.82562
published_at 2026-04-04T12:55:00Z
3
value 0.01759
scoring_system epss
scoring_elements 0.82559
published_at 2026-04-07T12:55:00Z
4
value 0.01759
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-08T12:55:00Z
5
value 0.01759
scoring_system epss
scoring_elements 0.82593
published_at 2026-04-09T12:55:00Z
6
value 0.01759
scoring_system epss
scoring_elements 0.82611
published_at 2026-04-11T12:55:00Z
7
value 0.01759
scoring_system epss
scoring_elements 0.82605
published_at 2026-04-12T12:55:00Z
8
value 0.01759
scoring_system epss
scoring_elements 0.82599
published_at 2026-04-13T12:55:00Z
9
value 0.01759
scoring_system epss
scoring_elements 0.82635
published_at 2026-04-16T12:55:00Z
10
value 0.01759
scoring_system epss
scoring_elements 0.82636
published_at 2026-04-18T12:55:00Z
11
value 0.01759
scoring_system epss
scoring_elements 0.82639
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1203715
reference_id 1203715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1203715
6
reference_url https://security.gentoo.org/glsa/201507-21
reference_id GLSA-201507-21
reference_type
scores
url https://security.gentoo.org/glsa/201507-21
7
reference_url https://access.redhat.com/errata/RHSA-2015:1708
reference_id RHSA-2015:1708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1708
8
reference_url https://usn.ubuntu.com/2536-1/
reference_id USN-2536-1
reference_type
scores
url https://usn.ubuntu.com/2536-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.5.1-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2015-1802
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w1u-kcvp-rygj
2
url VCID-3674-8j3b-xkee
vulnerability_id VCID-3674-8j3b-xkee
summary
Multiple vulnerabilities have been found in LibXfont and Libxfont2,
    the worst of which could allow attackers to cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13720.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13720
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19676
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19787
published_at 2026-04-11T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19741
published_at 2026-04-12T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19684
published_at 2026-04-13T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.1966
published_at 2026-04-16T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19662
published_at 2026-04-18T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19867
published_at 2026-04-02T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19923
published_at 2026-04-04T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.1965
published_at 2026-04-07T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.1973
published_at 2026-04-08T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19782
published_at 2026-04-09T12:55:00Z
11
value 0.00103
scoring_system epss
scoring_elements 0.28177
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13720
2
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1054285
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1054285
3
reference_url https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
reference_id
reference_type
scores
url https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:P/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2
reference_id
reference_type
scores
url https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2
8
reference_url http://www.debian.org/security/2017/dsa-3995
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3995
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500690
reference_id 1500690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13720
reference_id CVE-2017-13720
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13720
14
reference_url https://security.gentoo.org/glsa/201711-08
reference_id GLSA-201711-08
reference_type
scores
url https://security.gentoo.org/glsa/201711-08
15
reference_url https://usn.ubuntu.com/3442-1/
reference_id USN-3442-1
reference_type
scores
url https://usn.ubuntu.com/3442-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:2.0.1-4?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.1-4%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2017-13720
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3674-8j3b-xkee
3
url VCID-5fjg-kuqy-ekbn
vulnerability_id VCID-5fjg-kuqy-ekbn
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0211.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0211
reference_id
reference_type
scores
0
value 0.02432
scoring_system epss
scoring_elements 0.85085
published_at 2026-04-01T12:55:00Z
1
value 0.02432
scoring_system epss
scoring_elements 0.85097
published_at 2026-04-02T12:55:00Z
2
value 0.02432
scoring_system epss
scoring_elements 0.85115
published_at 2026-04-04T12:55:00Z
3
value 0.02432
scoring_system epss
scoring_elements 0.85119
published_at 2026-04-07T12:55:00Z
4
value 0.02432
scoring_system epss
scoring_elements 0.8514
published_at 2026-04-08T12:55:00Z
5
value 0.02432
scoring_system epss
scoring_elements 0.85147
published_at 2026-04-09T12:55:00Z
6
value 0.02432
scoring_system epss
scoring_elements 0.85162
published_at 2026-04-11T12:55:00Z
7
value 0.02432
scoring_system epss
scoring_elements 0.85159
published_at 2026-04-12T12:55:00Z
8
value 0.02432
scoring_system epss
scoring_elements 0.85156
published_at 2026-04-13T12:55:00Z
9
value 0.02432
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-16T12:55:00Z
10
value 0.02432
scoring_system epss
scoring_elements 0.85178
published_at 2026-04-18T12:55:00Z
11
value 0.02432
scoring_system epss
scoring_elements 0.85176
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1096601
reference_id 1096601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1096601
6
reference_url https://security.gentoo.org/glsa/201406-11
reference_id GLSA-201406-11
reference_type
scores
url https://security.gentoo.org/glsa/201406-11
7
reference_url https://access.redhat.com/errata/RHSA-2014:1870
reference_id RHSA-2014:1870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1870
8
reference_url https://access.redhat.com/errata/RHSA-2014:1893
reference_id RHSA-2014:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1893
9
reference_url https://usn.ubuntu.com/2211-1/
reference_id USN-2211-1
reference_type
scores
url https://usn.ubuntu.com/2211-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.4.7-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.4.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.7-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2014-0211
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fjg-kuqy-ekbn
4
url VCID-7sx8-amfh-wuh4
vulnerability_id VCID-7sx8-amfh-wuh4
summary
Multiple vulnerabilities have been found in libXfont, the worst of
    which could result in execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1803.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1803
reference_id
reference_type
scores
0
value 0.01712
scoring_system epss
scoring_elements 0.82275
published_at 2026-04-01T12:55:00Z
1
value 0.01712
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-02T12:55:00Z
2
value 0.01712
scoring_system epss
scoring_elements 0.82307
published_at 2026-04-04T12:55:00Z
3
value 0.01712
scoring_system epss
scoring_elements 0.82302
published_at 2026-04-07T12:55:00Z
4
value 0.01712
scoring_system epss
scoring_elements 0.82329
published_at 2026-04-08T12:55:00Z
5
value 0.01712
scoring_system epss
scoring_elements 0.82336
published_at 2026-04-09T12:55:00Z
6
value 0.01712
scoring_system epss
scoring_elements 0.82356
published_at 2026-04-11T12:55:00Z
7
value 0.01712
scoring_system epss
scoring_elements 0.82349
published_at 2026-04-12T12:55:00Z
8
value 0.01712
scoring_system epss
scoring_elements 0.82344
published_at 2026-04-13T12:55:00Z
9
value 0.01712
scoring_system epss
scoring_elements 0.82378
published_at 2026-04-16T12:55:00Z
10
value 0.01712
scoring_system epss
scoring_elements 0.82379
published_at 2026-04-18T12:55:00Z
11
value 0.01712
scoring_system epss
scoring_elements 0.82382
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1803
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1203718
reference_id 1203718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1203718
6
reference_url https://security.gentoo.org/glsa/201507-21
reference_id GLSA-201507-21
reference_type
scores
url https://security.gentoo.org/glsa/201507-21
7
reference_url https://access.redhat.com/errata/RHSA-2015:1708
reference_id RHSA-2015:1708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1708
8
reference_url https://usn.ubuntu.com/2536-1/
reference_id USN-2536-1
reference_type
scores
url https://usn.ubuntu.com/2536-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.5.1-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2015-1803
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sx8-amfh-wuh4
5
url VCID-8kcf-9dwq-dybz
vulnerability_id VCID-8kcf-9dwq-dybz
summary
A vulnerability has been found in LibXfont and LibXfont2 which may
    allow for arbitrary file access.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16611.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16611
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.1755
published_at 2026-04-01T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17542
published_at 2026-04-21T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17606
published_at 2026-04-12T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17553
published_at 2026-04-13T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17498
published_at 2026-04-16T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17507
published_at 2026-04-18T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17712
published_at 2026-04-02T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-04T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17486
published_at 2026-04-07T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17574
published_at 2026-04-08T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17634
published_at 2026-04-09T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17653
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16611
2
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1050459
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1050459
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611
4
reference_url http://security.cucumberlinux.com/security/details.php?id=155
reference_id
reference_type
scores
url http://security.cucumberlinux.com/security/details.php?id=155
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00028.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2022/01/msg00028.html
7
reference_url https://marc.info/?l=freedesktop-xorg-announce&m=151188044218304&w=2
reference_id
reference_type
scores
url https://marc.info/?l=freedesktop-xorg-announce&m=151188044218304&w=2
8
reference_url https://marc.info/?l=freedesktop-xorg-announce&m=151188049718337&w=2
reference_id
reference_type
scores
url https://marc.info/?l=freedesktop-xorg-announce&m=151188049718337&w=2
9
reference_url http://www.openwall.com/lists/oss-security/2017/11/28/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/11/28/7
10
reference_url http://www.ubuntu.com/usn/USN-3500-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3500-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519082
reference_id 1519082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519082
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883929
reference_id 883929
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883929
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16611
reference_id CVE-2017-16611
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16611
21
reference_url https://security.gentoo.org/glsa/201801-10
reference_id GLSA-201801-10
reference_type
scores
url https://security.gentoo.org/glsa/201801-10
22
reference_url https://usn.ubuntu.com/3500-1/
reference_id USN-3500-1
reference_type
scores
url https://usn.ubuntu.com/3500-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:2.0.3-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2017-16611
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kcf-9dwq-dybz
6
url VCID-9qnq-nhan-7ubj
vulnerability_id VCID-9qnq-nhan-7ubj
summary
Multiple vulnerabilities have been discovered in the X.Org X server and
    Xfont library, allowing for a local privilege escalation and arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0006.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0006
reference_id
reference_type
scores
0
value 0.29274
scoring_system epss
scoring_elements 0.96561
published_at 2026-04-01T12:55:00Z
1
value 0.29274
scoring_system epss
scoring_elements 0.9657
published_at 2026-04-02T12:55:00Z
2
value 0.29274
scoring_system epss
scoring_elements 0.96576
published_at 2026-04-04T12:55:00Z
3
value 0.29274
scoring_system epss
scoring_elements 0.96579
published_at 2026-04-07T12:55:00Z
4
value 0.29274
scoring_system epss
scoring_elements 0.96587
published_at 2026-04-08T12:55:00Z
5
value 0.29274
scoring_system epss
scoring_elements 0.96589
published_at 2026-04-09T12:55:00Z
6
value 0.29274
scoring_system epss
scoring_elements 0.96591
published_at 2026-04-11T12:55:00Z
7
value 0.29274
scoring_system epss
scoring_elements 0.96592
published_at 2026-04-12T12:55:00Z
8
value 0.29274
scoring_system epss
scoring_elements 0.96594
published_at 2026-04-13T12:55:00Z
9
value 0.29274
scoring_system epss
scoring_elements 0.96601
published_at 2026-04-16T12:55:00Z
10
value 0.29274
scoring_system epss
scoring_elements 0.96605
published_at 2026-04-18T12:55:00Z
11
value 0.29274
scoring_system epss
scoring_elements 0.96609
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=428044
reference_id 428044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=428044
4
reference_url https://security.gentoo.org/glsa/200801-09
reference_id GLSA-200801-09
reference_type
scores
url https://security.gentoo.org/glsa/200801-09
5
reference_url https://access.redhat.com/errata/RHSA-2008:0029
reference_id RHSA-2008:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0029
6
reference_url https://access.redhat.com/errata/RHSA-2008:0030
reference_id RHSA-2008:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0030
7
reference_url https://access.redhat.com/errata/RHSA-2008:0064
reference_id RHSA-2008:0064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0064
8
reference_url https://usn.ubuntu.com/571-1/
reference_id USN-571-1
reference_type
scores
url https://usn.ubuntu.com/571-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.3.1-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.3.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.3.1-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2008-0006
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qnq-nhan-7ubj
7
url VCID-dmke-csaa-e3cr
vulnerability_id VCID-dmke-csaa-e3cr
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0209.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0209
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.37994
published_at 2026-04-01T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38175
published_at 2026-04-02T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38198
published_at 2026-04-04T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38068
published_at 2026-04-07T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38118
published_at 2026-04-08T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38126
published_at 2026-04-09T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38144
published_at 2026-04-11T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38108
published_at 2026-04-12T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38084
published_at 2026-04-13T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.3813
published_at 2026-04-16T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.3811
published_at 2026-04-18T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.38046
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1096593
reference_id 1096593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1096593
6
reference_url https://security.gentoo.org/glsa/201406-11
reference_id GLSA-201406-11
reference_type
scores
url https://security.gentoo.org/glsa/201406-11
7
reference_url https://access.redhat.com/errata/RHSA-2014:1870
reference_id RHSA-2014:1870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1870
8
reference_url https://access.redhat.com/errata/RHSA-2014:1893
reference_id RHSA-2014:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1893
9
reference_url https://usn.ubuntu.com/2211-1/
reference_id USN-2211-1
reference_type
scores
url https://usn.ubuntu.com/2211-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.4.7-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.4.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.7-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2014-0209
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmke-csaa-e3cr
8
url VCID-ga8x-3k6b-yfgr
vulnerability_id VCID-ga8x-3k6b-yfgr
summary
Some buffer overflows were discovered in the CID font parser, potentially
    resulting in the execution of arbitrary code with elevated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3740.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3740
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21453
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.2162
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21678
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21433
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.2151
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21568
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.2158
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21541
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21486
published_at 2026-04-13T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21481
published_at 2026-04-16T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21487
published_at 2026-04-18T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21457
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618156
reference_id 1618156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618156
4
reference_url https://security.gentoo.org/glsa/200609-07
reference_id GLSA-200609-07
reference_type
scores
url https://security.gentoo.org/glsa/200609-07
5
reference_url https://access.redhat.com/errata/RHSA-2006:0665
reference_id RHSA-2006:0665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0665
6
reference_url https://access.redhat.com/errata/RHSA-2006:0666
reference_id RHSA-2006:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0666
7
reference_url https://usn.ubuntu.com/344-1/
reference_id USN-344-1
reference_type
scores
url https://usn.ubuntu.com/344-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.2.2-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2006-3740
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ga8x-3k6b-yfgr
9
url VCID-gty4-vgqp-6ufn
vulnerability_id VCID-gty4-vgqp-6ufn
summary libxfont: single byte overflow in catalogue.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5199.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5199
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66142
published_at 2026-04-01T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66183
published_at 2026-04-02T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.6621
published_at 2026-04-04T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.66179
published_at 2026-04-07T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66227
published_at 2026-04-08T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.6624
published_at 2026-04-09T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.6626
published_at 2026-04-11T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66247
published_at 2026-04-12T12:55:00Z
8
value 0.00506
scoring_system epss
scoring_elements 0.66216
published_at 2026-04-13T12:55:00Z
9
value 0.00506
scoring_system epss
scoring_elements 0.66252
published_at 2026-04-16T12:55:00Z
10
value 0.00506
scoring_system epss
scoring_elements 0.66267
published_at 2026-04-18T12:55:00Z
11
value 0.00506
scoring_system epss
scoring_elements 0.66251
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5199
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5199
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1484018
reference_id 1484018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1484018
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.3.2-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.3.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.3.2-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2007-5199
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gty4-vgqp-6ufn
10
url VCID-jzgb-xjfg-3beb
vulnerability_id VCID-jzgb-xjfg-3beb
summary
Some buffer overflows were discovered in the CID font parser, potentially
    resulting in the execution of arbitrary code with elevated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3739
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38919
published_at 2026-04-01T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39105
published_at 2026-04-02T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39127
published_at 2026-04-04T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39046
published_at 2026-04-07T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39101
published_at 2026-04-08T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-09T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.3913
published_at 2026-04-11T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-12T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39072
published_at 2026-04-13T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39128
published_at 2026-04-16T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39098
published_at 2026-04-18T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.3901
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3739
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618155
reference_id 1618155
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618155
4
reference_url https://security.gentoo.org/glsa/200609-07
reference_id GLSA-200609-07
reference_type
scores
url https://security.gentoo.org/glsa/200609-07
5
reference_url https://access.redhat.com/errata/RHSA-2006:0665
reference_id RHSA-2006:0665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0665
6
reference_url https://access.redhat.com/errata/RHSA-2006:0666
reference_id RHSA-2006:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0666
7
reference_url https://usn.ubuntu.com/344-1/
reference_id USN-344-1
reference_type
scores
url https://usn.ubuntu.com/344-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.2.2-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2006-3739
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzgb-xjfg-3beb
11
url VCID-qn37-kjm4-tbap
vulnerability_id VCID-qn37-kjm4-tbap
summary
A vulnerability has been discovered in FreeType allowing for user-assisted
    remote execution of arbitrary code.
references
0
reference_url http://issues.foresightlinux.org/browse/FL-223
reference_id
reference_type
scores
url http://issues.foresightlinux.org/browse/FL-223
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0125.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0125.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1351
reference_id
reference_type
scores
0
value 0.07768
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-21T12:55:00Z
1
value 0.07768
scoring_system epss
scoring_elements 0.91916
published_at 2026-04-01T12:55:00Z
2
value 0.07768
scoring_system epss
scoring_elements 0.91924
published_at 2026-04-02T12:55:00Z
3
value 0.07768
scoring_system epss
scoring_elements 0.91932
published_at 2026-04-04T12:55:00Z
4
value 0.07768
scoring_system epss
scoring_elements 0.91938
published_at 2026-04-07T12:55:00Z
5
value 0.07768
scoring_system epss
scoring_elements 0.91951
published_at 2026-04-08T12:55:00Z
6
value 0.07768
scoring_system epss
scoring_elements 0.91956
published_at 2026-04-13T12:55:00Z
7
value 0.07768
scoring_system epss
scoring_elements 0.91959
published_at 2026-04-12T12:55:00Z
8
value 0.07768
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-16T12:55:00Z
9
value 0.07768
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1351
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351
9
reference_url http://secunia.com/advisories/24741
reference_id
reference_type
scores
url http://secunia.com/advisories/24741
10
reference_url http://secunia.com/advisories/24745
reference_id
reference_type
scores
url http://secunia.com/advisories/24745
11
reference_url http://secunia.com/advisories/24756
reference_id
reference_type
scores
url http://secunia.com/advisories/24756
12
reference_url http://secunia.com/advisories/24758
reference_id
reference_type
scores
url http://secunia.com/advisories/24758
13
reference_url http://secunia.com/advisories/24765
reference_id
reference_type
scores
url http://secunia.com/advisories/24765
14
reference_url http://secunia.com/advisories/24768
reference_id
reference_type
scores
url http://secunia.com/advisories/24768
15
reference_url http://secunia.com/advisories/24770
reference_id
reference_type
scores
url http://secunia.com/advisories/24770
16
reference_url http://secunia.com/advisories/24771
reference_id
reference_type
scores
url http://secunia.com/advisories/24771
17
reference_url http://secunia.com/advisories/24772
reference_id
reference_type
scores
url http://secunia.com/advisories/24772
18
reference_url http://secunia.com/advisories/24776
reference_id
reference_type
scores
url http://secunia.com/advisories/24776
19
reference_url http://secunia.com/advisories/24791
reference_id
reference_type
scores
url http://secunia.com/advisories/24791
20
reference_url http://secunia.com/advisories/24885
reference_id
reference_type
scores
url http://secunia.com/advisories/24885
21
reference_url http://secunia.com/advisories/24889
reference_id
reference_type
scores
url http://secunia.com/advisories/24889
22
reference_url http://secunia.com/advisories/24921
reference_id
reference_type
scores
url http://secunia.com/advisories/24921
23
reference_url http://secunia.com/advisories/24996
reference_id
reference_type
scores
url http://secunia.com/advisories/24996
24
reference_url http://secunia.com/advisories/25004
reference_id
reference_type
scores
url http://secunia.com/advisories/25004
25
reference_url http://secunia.com/advisories/25006
reference_id
reference_type
scores
url http://secunia.com/advisories/25006
26
reference_url http://secunia.com/advisories/25096
reference_id
reference_type
scores
url http://secunia.com/advisories/25096
27
reference_url http://secunia.com/advisories/25195
reference_id
reference_type
scores
url http://secunia.com/advisories/25195
28
reference_url http://secunia.com/advisories/25216
reference_id
reference_type
scores
url http://secunia.com/advisories/25216
29
reference_url http://secunia.com/advisories/25305
reference_id
reference_type
scores
url http://secunia.com/advisories/25305
30
reference_url http://secunia.com/advisories/25495
reference_id
reference_type
scores
url http://secunia.com/advisories/25495
31
reference_url http://secunia.com/advisories/28333
reference_id
reference_type
scores
url http://secunia.com/advisories/28333
32
reference_url http://secunia.com/advisories/30161
reference_id
reference_type
scores
url http://secunia.com/advisories/30161
33
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
34
reference_url http://security.gentoo.org/glsa/glsa-200705-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-02.xml
35
reference_url http://security.gentoo.org/glsa/glsa-200705-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-10.xml
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33417
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33417
37
reference_url https://issues.rpath.com/browse/RPL-1213
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1213
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
39
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954
40
reference_url http://sourceforge.net/project/shownotes.php?release_id=498954
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=498954
41
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
42
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810
43
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
44
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
45
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
46
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm
47
reference_url http://www.debian.org/security/2007/dsa-1294
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1294
48
reference_url http://www.debian.org/security/2008/dsa-1454
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1454
49
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
50
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
51
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
52
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:081
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:081
53
reference_url http://www.novell.com/linux/security/advisories/2007_27_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_27_x.html
54
reference_url http://www.novell.com/linux/security/advisories/2007_6_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_6_sr.html
55
reference_url http://www.openbsd.org/errata39.html#021_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata39.html#021_xorg
56
reference_url http://www.openbsd.org/errata40.html#011_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata40.html#011_xorg
57
reference_url http://www.redhat.com/support/errata/RHSA-2007-0126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0126.html
58
reference_url http://www.redhat.com/support/errata/RHSA-2007-0132.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0132.html
59
reference_url http://www.redhat.com/support/errata/RHSA-2007-0150.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0150.html
60
reference_url http://www.securityfocus.com/archive/1/464686/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464686/100/0/threaded
61
reference_url http://www.securityfocus.com/archive/1/464816/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464816/100/0/threaded
62
reference_url http://www.securityfocus.com/bid/23283
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23283
63
reference_url http://www.securityfocus.com/bid/23300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23300
64
reference_url http://www.securityfocus.com/bid/23402
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23402
65
reference_url http://www.securitytracker.com/id?1017857
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017857
66
reference_url http://www.trustix.org/errata/2007/0013/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0013/
67
reference_url http://www.ubuntu.com/usn/usn-448-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-448-1
68
reference_url http://www.vupen.com/english/advisories/2007/1217
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1217
69
reference_url http://www.vupen.com/english/advisories/2007/1264
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1264
70
reference_url http://www.vupen.com/english/advisories/2007/1548
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1548
71
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235265
reference_id 235265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235265
72
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771
reference_id 426771
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1351
reference_id CVE-2007-1351
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1351
119
reference_url https://security.gentoo.org/glsa/200705-02
reference_id GLSA-200705-02
reference_type
scores
url https://security.gentoo.org/glsa/200705-02
120
reference_url https://security.gentoo.org/glsa/200705-10
reference_id GLSA-200705-10
reference_type
scores
url https://security.gentoo.org/glsa/200705-10
121
reference_url https://access.redhat.com/errata/RHSA-2007:0125
reference_id RHSA-2007:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0125
122
reference_url https://access.redhat.com/errata/RHSA-2007:0126
reference_id RHSA-2007:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0126
123
reference_url https://access.redhat.com/errata/RHSA-2007:0132
reference_id RHSA-2007:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0132
124
reference_url https://access.redhat.com/errata/RHSA-2007:0150
reference_id RHSA-2007:0150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0150
125
reference_url https://usn.ubuntu.com/448-1/
reference_id USN-448-1
reference_type
scores
url https://usn.ubuntu.com/448-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.2.2-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.2.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.2.2-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2007-1351
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qn37-kjm4-tbap
12
url VCID-rntx-ztv9-sqax
vulnerability_id VCID-rntx-ztv9-sqax
summary
Multiple vulnerabilities have been reported in libXfont and TightVNC,
    allowing for the execution of arbitrary code with root privileges.
references
0
reference_url http://issues.foresightlinux.org/browse/FL-223
reference_id
reference_type
scores
url http://issues.foresightlinux.org/browse/FL-223
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0125.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0125.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1352.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1352
reference_id
reference_type
scores
0
value 0.01697
scoring_system epss
scoring_elements 0.82315
published_at 2026-04-21T12:55:00Z
1
value 0.01697
scoring_system epss
scoring_elements 0.82208
published_at 2026-04-01T12:55:00Z
2
value 0.01697
scoring_system epss
scoring_elements 0.8222
published_at 2026-04-02T12:55:00Z
3
value 0.01697
scoring_system epss
scoring_elements 0.82241
published_at 2026-04-04T12:55:00Z
4
value 0.01697
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-07T12:55:00Z
5
value 0.01697
scoring_system epss
scoring_elements 0.82263
published_at 2026-04-08T12:55:00Z
6
value 0.01697
scoring_system epss
scoring_elements 0.82271
published_at 2026-04-09T12:55:00Z
7
value 0.01697
scoring_system epss
scoring_elements 0.8229
published_at 2026-04-11T12:55:00Z
8
value 0.01697
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-12T12:55:00Z
9
value 0.01697
scoring_system epss
scoring_elements 0.82277
published_at 2026-04-13T12:55:00Z
10
value 0.01697
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-16T12:55:00Z
11
value 0.01697
scoring_system epss
scoring_elements 0.82313
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1352
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352
9
reference_url http://secunia.com/advisories/24741
reference_id
reference_type
scores
url http://secunia.com/advisories/24741
10
reference_url http://secunia.com/advisories/24745
reference_id
reference_type
scores
url http://secunia.com/advisories/24745
11
reference_url http://secunia.com/advisories/24756
reference_id
reference_type
scores
url http://secunia.com/advisories/24756
12
reference_url http://secunia.com/advisories/24758
reference_id
reference_type
scores
url http://secunia.com/advisories/24758
13
reference_url http://secunia.com/advisories/24765
reference_id
reference_type
scores
url http://secunia.com/advisories/24765
14
reference_url http://secunia.com/advisories/24770
reference_id
reference_type
scores
url http://secunia.com/advisories/24770
15
reference_url http://secunia.com/advisories/24771
reference_id
reference_type
scores
url http://secunia.com/advisories/24771
16
reference_url http://secunia.com/advisories/24772
reference_id
reference_type
scores
url http://secunia.com/advisories/24772
17
reference_url http://secunia.com/advisories/24791
reference_id
reference_type
scores
url http://secunia.com/advisories/24791
18
reference_url http://secunia.com/advisories/25004
reference_id
reference_type
scores
url http://secunia.com/advisories/25004
19
reference_url http://secunia.com/advisories/25006
reference_id
reference_type
scores
url http://secunia.com/advisories/25006
20
reference_url http://secunia.com/advisories/25195
reference_id
reference_type
scores
url http://secunia.com/advisories/25195
21
reference_url http://secunia.com/advisories/25216
reference_id
reference_type
scores
url http://secunia.com/advisories/25216
22
reference_url http://secunia.com/advisories/25305
reference_id
reference_type
scores
url http://secunia.com/advisories/25305
23
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
24
reference_url http://security.gentoo.org/glsa/glsa-200705-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-10.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
26
reference_url https://issues.rpath.com/browse/RPL-1213
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1213
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
29
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
30
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
31
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
32
reference_url http://www.debian.org/security/2007/dsa-1294
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1294
33
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
34
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
35
reference_url http://www.novell.com/linux/security/advisories/2007_27_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_27_x.html
36
reference_url http://www.openbsd.org/errata39.html#021_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata39.html#021_xorg
37
reference_url http://www.openbsd.org/errata40.html#011_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata40.html#011_xorg
38
reference_url http://www.redhat.com/support/errata/RHSA-2007-0126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0126.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2007-0132.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0132.html
40
reference_url http://www.securityfocus.com/archive/1/464686/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464686/100/0/threaded
41
reference_url http://www.securityfocus.com/archive/1/464816/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464816/100/0/threaded
42
reference_url http://www.securityfocus.com/bid/23283
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23283
43
reference_url http://www.securityfocus.com/bid/23300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23300
44
reference_url http://www.securitytracker.com/id?1017857
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017857
45
reference_url http://www.ubuntu.com/usn/usn-448-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-448-1
46
reference_url http://www.vupen.com/english/advisories/2007/1217
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1217
47
reference_url http://www.vupen.com/english/advisories/2007/1548
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1548
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235265
reference_id 235265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235265
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1352
reference_id CVE-2007-1352
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1352
106
reference_url https://security.gentoo.org/glsa/200705-10
reference_id GLSA-200705-10
reference_type
scores
url https://security.gentoo.org/glsa/200705-10
107
reference_url https://access.redhat.com/errata/RHSA-2007:0125
reference_id RHSA-2007:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0125
108
reference_url https://access.redhat.com/errata/RHSA-2007:0126
reference_id RHSA-2007:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0126
109
reference_url https://access.redhat.com/errata/RHSA-2007:0132
reference_id RHSA-2007:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0132
110
reference_url https://usn.ubuntu.com/448-1/
reference_id USN-448-1
reference_type
scores
url https://usn.ubuntu.com/448-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.2.2-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.2.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.2.2-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2007-1352
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rntx-ztv9-sqax
13
url VCID-s3f6-paas-vye4
vulnerability_id VCID-s3f6-paas-vye4
summary
A buffer overflow was discovered in the PCF font parser, potentially
    resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3467
reference_id
reference_type
scores
0
value 0.08679
scoring_system epss
scoring_elements 0.92432
published_at 2026-04-01T12:55:00Z
1
value 0.08679
scoring_system epss
scoring_elements 0.92439
published_at 2026-04-02T12:55:00Z
2
value 0.08679
scoring_system epss
scoring_elements 0.92447
published_at 2026-04-04T12:55:00Z
3
value 0.08679
scoring_system epss
scoring_elements 0.9245
published_at 2026-04-07T12:55:00Z
4
value 0.08679
scoring_system epss
scoring_elements 0.92461
published_at 2026-04-08T12:55:00Z
5
value 0.08679
scoring_system epss
scoring_elements 0.92466
published_at 2026-04-09T12:55:00Z
6
value 0.08679
scoring_system epss
scoring_elements 0.92472
published_at 2026-04-11T12:55:00Z
7
value 0.08679
scoring_system epss
scoring_elements 0.92475
published_at 2026-04-12T12:55:00Z
8
value 0.08679
scoring_system epss
scoring_elements 0.92473
published_at 2026-04-13T12:55:00Z
9
value 0.08679
scoring_system epss
scoring_elements 0.92483
published_at 2026-04-18T12:55:00Z
10
value 0.08679
scoring_system epss
scoring_elements 0.92486
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920
reference_id 379920
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353
reference_id 383353
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=487070
reference_id 487070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=487070
6
reference_url https://security.gentoo.org/glsa/200609-04
reference_id GLSA-200609-04
reference_type
scores
url https://security.gentoo.org/glsa/200609-04
7
reference_url https://access.redhat.com/errata/RHSA-2006:0500
reference_id RHSA-2006:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0500
8
reference_url https://access.redhat.com/errata/RHSA-2006:0634
reference_id RHSA-2006:0634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0634
9
reference_url https://access.redhat.com/errata/RHSA-2006:0635
reference_id RHSA-2006:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0635
10
reference_url https://usn.ubuntu.com/324-1/
reference_id USN-324-1
reference_type
scores
url https://usn.ubuntu.com/324-1/
11
reference_url https://usn.ubuntu.com/341-1/
reference_id USN-341-1
reference_type
scores
url https://usn.ubuntu.com/341-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.2.0-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.2.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.2.0-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2006-3467
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3f6-paas-vye4
14
url VCID-sg7w-33jd-2yap
vulnerability_id VCID-sg7w-33jd-2yap
summary
Multiple vulnerabilities have been found in libXfont, the worst of
    which allow for local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2895.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2895
reference_id
reference_type
scores
0
value 0.07018
scoring_system epss
scoring_elements 0.91431
published_at 2026-04-01T12:55:00Z
1
value 0.07018
scoring_system epss
scoring_elements 0.91437
published_at 2026-04-02T12:55:00Z
2
value 0.07018
scoring_system epss
scoring_elements 0.91447
published_at 2026-04-04T12:55:00Z
3
value 0.07018
scoring_system epss
scoring_elements 0.91455
published_at 2026-04-07T12:55:00Z
4
value 0.07018
scoring_system epss
scoring_elements 0.91467
published_at 2026-04-08T12:55:00Z
5
value 0.07018
scoring_system epss
scoring_elements 0.91474
published_at 2026-04-09T12:55:00Z
6
value 0.07018
scoring_system epss
scoring_elements 0.91479
published_at 2026-04-11T12:55:00Z
7
value 0.07018
scoring_system epss
scoring_elements 0.91482
published_at 2026-04-12T12:55:00Z
8
value 0.07018
scoring_system epss
scoring_elements 0.9148
published_at 2026-04-13T12:55:00Z
9
value 0.07018
scoring_system epss
scoring_elements 0.91504
published_at 2026-04-16T12:55:00Z
10
value 0.07018
scoring_system epss
scoring_elements 0.91499
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2895
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=727624
reference_id 727624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=727624
4
reference_url https://security.gentoo.org/glsa/201402-23
reference_id GLSA-201402-23
reference_type
scores
url https://security.gentoo.org/glsa/201402-23
5
reference_url https://access.redhat.com/errata/RHSA-2011:1154
reference_id RHSA-2011:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1154
6
reference_url https://access.redhat.com/errata/RHSA-2011:1155
reference_id RHSA-2011:1155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1155
7
reference_url https://access.redhat.com/errata/RHSA-2011:1161
reference_id RHSA-2011:1161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1161
8
reference_url https://access.redhat.com/errata/RHSA-2011:1834
reference_id RHSA-2011:1834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1834
9
reference_url https://usn.ubuntu.com/1191-1/
reference_id USN-1191-1
reference_type
scores
url https://usn.ubuntu.com/1191-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.4.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.4.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.4-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2011-2895
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sg7w-33jd-2yap
15
url VCID-vs3c-a2u9-bqge
vulnerability_id VCID-vs3c-a2u9-bqge
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0210.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0210
reference_id
reference_type
scores
0
value 0.02105
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-01T12:55:00Z
1
value 0.02105
scoring_system epss
scoring_elements 0.84031
published_at 2026-04-02T12:55:00Z
2
value 0.02105
scoring_system epss
scoring_elements 0.84048
published_at 2026-04-04T12:55:00Z
3
value 0.02105
scoring_system epss
scoring_elements 0.8405
published_at 2026-04-07T12:55:00Z
4
value 0.02105
scoring_system epss
scoring_elements 0.84074
published_at 2026-04-08T12:55:00Z
5
value 0.02105
scoring_system epss
scoring_elements 0.8408
published_at 2026-04-09T12:55:00Z
6
value 0.02105
scoring_system epss
scoring_elements 0.84098
published_at 2026-04-11T12:55:00Z
7
value 0.02105
scoring_system epss
scoring_elements 0.84091
published_at 2026-04-12T12:55:00Z
8
value 0.02105
scoring_system epss
scoring_elements 0.84087
published_at 2026-04-13T12:55:00Z
9
value 0.02105
scoring_system epss
scoring_elements 0.84109
published_at 2026-04-16T12:55:00Z
10
value 0.02105
scoring_system epss
scoring_elements 0.84112
published_at 2026-04-18T12:55:00Z
11
value 0.02105
scoring_system epss
scoring_elements 0.84114
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1096597
reference_id 1096597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1096597
6
reference_url https://security.gentoo.org/glsa/201406-11
reference_id GLSA-201406-11
reference_type
scores
url https://security.gentoo.org/glsa/201406-11
7
reference_url https://access.redhat.com/errata/RHSA-2014:1870
reference_id RHSA-2014:1870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1870
8
reference_url https://access.redhat.com/errata/RHSA-2014:1893
reference_id RHSA-2014:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1893
9
reference_url https://usn.ubuntu.com/2211-1/
reference_id USN-2211-1
reference_type
scores
url https://usn.ubuntu.com/2211-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.4.7-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.4.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.7-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2014-0210
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vs3c-a2u9-bqge
16
url VCID-xhfh-vnnu-6kgj
vulnerability_id VCID-xhfh-vnnu-6kgj
summary
Multiple vulnerabilities have been found in libXfont, the worst of
    which allow for local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6462.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6462
reference_id
reference_type
scores
0
value 0.12029
scoring_system epss
scoring_elements 0.93742
published_at 2026-04-01T12:55:00Z
1
value 0.12029
scoring_system epss
scoring_elements 0.93751
published_at 2026-04-02T12:55:00Z
2
value 0.12029
scoring_system epss
scoring_elements 0.93761
published_at 2026-04-04T12:55:00Z
3
value 0.12029
scoring_system epss
scoring_elements 0.93764
published_at 2026-04-07T12:55:00Z
4
value 0.12029
scoring_system epss
scoring_elements 0.93773
published_at 2026-04-08T12:55:00Z
5
value 0.12029
scoring_system epss
scoring_elements 0.93775
published_at 2026-04-09T12:55:00Z
6
value 0.12029
scoring_system epss
scoring_elements 0.9378
published_at 2026-04-12T12:55:00Z
7
value 0.12029
scoring_system epss
scoring_elements 0.93781
published_at 2026-04-13T12:55:00Z
8
value 0.12029
scoring_system epss
scoring_elements 0.93803
published_at 2026-04-16T12:55:00Z
9
value 0.12029
scoring_system epss
scoring_elements 0.93808
published_at 2026-04-18T12:55:00Z
10
value 0.12029
scoring_system epss
scoring_elements 0.9381
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1048044
reference_id 1048044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1048044
4
reference_url https://security.gentoo.org/glsa/201402-23
reference_id GLSA-201402-23
reference_type
scores
url https://security.gentoo.org/glsa/201402-23
5
reference_url https://access.redhat.com/errata/RHSA-2014:0018
reference_id RHSA-2014:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0018
6
reference_url https://usn.ubuntu.com/2078-1/
reference_id USN-2078-1
reference_type
scores
url https://usn.ubuntu.com/2078-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:1.4.7-1?distro=trixie
purl pkg:deb/debian/libxfont@1:1.4.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.7-1%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2013-6462
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhfh-vnnu-6kgj
17
url VCID-yduw-uqsw-g7b9
vulnerability_id VCID-yduw-uqsw-g7b9
summary
Multiple vulnerabilities have been found in LibXfont and Libxfont2,
    the worst of which could allow attackers to cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13722.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13722
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20599
published_at 2026-04-21T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.2072
published_at 2026-04-11T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20677
published_at 2026-04-12T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20624
published_at 2026-04-13T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.2061
published_at 2026-04-16T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20608
published_at 2026-04-18T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20789
published_at 2026-04-02T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20848
published_at 2026-04-04T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20562
published_at 2026-04-07T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20639
published_at 2026-04-08T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.207
published_at 2026-04-09T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27759
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13722
2
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1049692
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1049692
3
reference_url https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=672bb944311392e2415b39c0d63b1e1902905bcd
reference_id
reference_type
scores
url https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=672bb944311392e2415b39c0d63b1e1902905bcd
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:P
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2
reference_id
reference_type
scores
url https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2
8
reference_url http://www.debian.org/security/2017/dsa-3995
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3995
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500693
reference_id 1500693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500693
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13722
reference_id CVE-2017-13722
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13722
14
reference_url https://security.gentoo.org/glsa/201711-08
reference_id GLSA-201711-08
reference_type
scores
url https://security.gentoo.org/glsa/201711-08
15
reference_url https://usn.ubuntu.com/3442-1/
reference_id USN-3442-1
reference_type
scores
url https://usn.ubuntu.com/3442-1/
fixed_packages
0
url pkg:deb/debian/libxfont@1:2.0.1-4?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.1-4%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
aliases CVE-2017-13722
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yduw-uqsw-g7b9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie