Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
Typedeb
Namespacedebian
Nametigervnc
Version1.11.0+dfsg-2+deb11u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.12.0+dfsg-8
Latest_non_vulnerable_version1.15.0+dfsg-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2cqy-wq3e-dyat
vulnerability_id VCID-2cqy-wq3e-dyat
summary Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26117
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71863
published_at 2026-04-29T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.7182
published_at 2026-04-16T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.71826
published_at 2026-04-18T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71808
published_at 2026-04-21T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71854
published_at 2026-04-24T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.7186
published_at 2026-04-26T12:55:00Z
6
value 0.00935
scoring_system epss
scoring_elements 0.76169
published_at 2026-04-09T12:55:00Z
7
value 0.00935
scoring_system epss
scoring_elements 0.76195
published_at 2026-04-11T12:55:00Z
8
value 0.00935
scoring_system epss
scoring_elements 0.76171
published_at 2026-04-12T12:55:00Z
9
value 0.00935
scoring_system epss
scoring_elements 0.76168
published_at 2026-04-13T12:55:00Z
10
value 0.00935
scoring_system epss
scoring_elements 0.76107
published_at 2026-04-01T12:55:00Z
11
value 0.00935
scoring_system epss
scoring_elements 0.76156
published_at 2026-04-08T12:55:00Z
12
value 0.00935
scoring_system epss
scoring_elements 0.76111
published_at 2026-04-02T12:55:00Z
13
value 0.00935
scoring_system epss
scoring_elements 0.76143
published_at 2026-04-04T12:55:00Z
14
value 0.00935
scoring_system epss
scoring_elements 0.76123
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26117
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1882841
reference_id 1882841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1882841
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272
reference_id 971272
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272
6
reference_url https://security.gentoo.org/glsa/202407-14
reference_id GLSA-202407-14
reference_type
scores
url https://security.gentoo.org/glsa/202407-14
7
reference_url https://access.redhat.com/errata/RHSA-2021:1783
reference_id RHSA-2021:1783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1783
8
reference_url https://usn.ubuntu.com/5965-1/
reference_id USN-5965-1
reference_type
scores
url https://usn.ubuntu.com/5965-1/
fixed_packages
0
url pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-9%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2020-26117
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cqy-wq3e-dyat
1
url VCID-35c9-gt1z-6yfp
vulnerability_id VCID-35c9-gt1z-6yfp
summary
Multiple vulnerabilities have been found in TigerVNC, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7395.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7395
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.50996
published_at 2026-04-29T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51029
published_at 2026-04-24T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51036
published_at 2026-04-26T12:55:00Z
3
value 0.00481
scoring_system epss
scoring_elements 0.6516
published_at 2026-04-21T12:55:00Z
4
value 0.00481
scoring_system epss
scoring_elements 0.65046
published_at 2026-04-01T12:55:00Z
5
value 0.00481
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-02T12:55:00Z
6
value 0.00481
scoring_system epss
scoring_elements 0.65123
published_at 2026-04-04T12:55:00Z
7
value 0.00481
scoring_system epss
scoring_elements 0.65087
published_at 2026-04-07T12:55:00Z
8
value 0.00481
scoring_system epss
scoring_elements 0.65136
published_at 2026-04-08T12:55:00Z
9
value 0.00481
scoring_system epss
scoring_elements 0.65149
published_at 2026-04-09T12:55:00Z
10
value 0.00481
scoring_system epss
scoring_elements 0.65168
published_at 2026-04-11T12:55:00Z
11
value 0.00481
scoring_system epss
scoring_elements 0.65158
published_at 2026-04-12T12:55:00Z
12
value 0.00481
scoring_system epss
scoring_elements 0.6513
published_at 2026-04-13T12:55:00Z
13
value 0.00481
scoring_system epss
scoring_elements 0.65166
published_at 2026-04-16T12:55:00Z
14
value 0.00481
scoring_system epss
scoring_elements 0.65176
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/TigerVNC/tigervnc/pull/436
reference_id
reference_type
scores
url https://github.com/TigerVNC/tigervnc/pull/436
5
reference_url https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689
reference_id
reference_type
scores
url https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689
6
reference_url http://www.securityfocus.com/bid/97305
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97305
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1438701
reference_id 1438701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1438701
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
reference_id 859259
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7395
reference_id CVE-2017-7395
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7395
11
reference_url https://security.gentoo.org/glsa/201801-13
reference_id GLSA-201801-13
reference_type
scores
url https://security.gentoo.org/glsa/201801-13
12
reference_url https://access.redhat.com/errata/RHSA-2017:2000
reference_id RHSA-2017:2000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2000
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2017-7395
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35c9-gt1z-6yfp
2
url VCID-4ccf-xab2-nfg1
vulnerability_id VCID-4ccf-xab2-nfg1
summary
Multiple vulnerabilities have been found in TigerVNC, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7396.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7396
reference_id
reference_type
scores
0
value 0.0046
scoring_system epss
scoring_elements 0.64157
published_at 2026-04-16T12:55:00Z
1
value 0.0046
scoring_system epss
scoring_elements 0.6412
published_at 2026-04-13T12:55:00Z
2
value 0.0046
scoring_system epss
scoring_elements 0.64156
published_at 2026-04-21T12:55:00Z
3
value 0.0046
scoring_system epss
scoring_elements 0.64168
published_at 2026-04-18T12:55:00Z
4
value 0.00528
scoring_system epss
scoring_elements 0.67189
published_at 2026-04-08T12:55:00Z
5
value 0.00528
scoring_system epss
scoring_elements 0.67221
published_at 2026-04-11T12:55:00Z
6
value 0.00528
scoring_system epss
scoring_elements 0.67207
published_at 2026-04-12T12:55:00Z
7
value 0.00528
scoring_system epss
scoring_elements 0.67202
published_at 2026-04-09T12:55:00Z
8
value 0.00528
scoring_system epss
scoring_elements 0.67104
published_at 2026-04-01T12:55:00Z
9
value 0.00528
scoring_system epss
scoring_elements 0.67141
published_at 2026-04-02T12:55:00Z
10
value 0.00528
scoring_system epss
scoring_elements 0.67164
published_at 2026-04-04T12:55:00Z
11
value 0.00528
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-07T12:55:00Z
12
value 0.00625
scoring_system epss
scoring_elements 0.70256
published_at 2026-04-26T12:55:00Z
13
value 0.00625
scoring_system epss
scoring_elements 0.70255
published_at 2026-04-29T12:55:00Z
14
value 0.00625
scoring_system epss
scoring_elements 0.70248
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/TigerVNC/tigervnc/pull/436
reference_id
reference_type
scores
url https://github.com/TigerVNC/tigervnc/pull/436
5
reference_url https://github.com/TigerVNC/tigervnc/pull/436/commits/dccb5f7d776e93863ae10bbff56a45c523c6eeb0
reference_id
reference_type
scores
url https://github.com/TigerVNC/tigervnc/pull/436/commits/dccb5f7d776e93863ae10bbff56a45c523c6eeb0
6
reference_url http://www.securityfocus.com/bid/97305
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97305
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1438703
reference_id 1438703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1438703
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
reference_id 859259
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7396
reference_id CVE-2017-7396
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7396
11
reference_url https://security.gentoo.org/glsa/201801-13
reference_id GLSA-201801-13
reference_type
scores
url https://security.gentoo.org/glsa/201801-13
12
reference_url https://access.redhat.com/errata/RHSA-2017:2000
reference_id RHSA-2017:2000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2000
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2017-7396
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ccf-xab2-nfg1
3
url VCID-4kdt-7mph-j3ej
vulnerability_id VCID-4kdt-7mph-j3ej
summary Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15695.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15695
reference_id
reference_type
scores
0
value 0.03257
scoring_system epss
scoring_elements 0.87081
published_at 2026-04-01T12:55:00Z
1
value 0.03257
scoring_system epss
scoring_elements 0.87092
published_at 2026-04-02T12:55:00Z
2
value 0.03257
scoring_system epss
scoring_elements 0.87109
published_at 2026-04-04T12:55:00Z
3
value 0.03257
scoring_system epss
scoring_elements 0.87102
published_at 2026-04-07T12:55:00Z
4
value 0.03257
scoring_system epss
scoring_elements 0.87123
published_at 2026-04-08T12:55:00Z
5
value 0.03257
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-09T12:55:00Z
6
value 0.03257
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-11T12:55:00Z
7
value 0.03257
scoring_system epss
scoring_elements 0.87138
published_at 2026-04-12T12:55:00Z
8
value 0.03257
scoring_system epss
scoring_elements 0.87133
published_at 2026-04-13T12:55:00Z
9
value 0.03257
scoring_system epss
scoring_elements 0.87149
published_at 2026-04-16T12:55:00Z
10
value 0.03257
scoring_system epss
scoring_elements 0.87154
published_at 2026-04-18T12:55:00Z
11
value 0.03257
scoring_system epss
scoring_elements 0.8715
published_at 2026-04-21T12:55:00Z
12
value 0.03257
scoring_system epss
scoring_elements 0.87169
published_at 2026-04-24T12:55:00Z
13
value 0.03257
scoring_system epss
scoring_elements 0.87175
published_at 2026-04-26T12:55:00Z
14
value 0.03257
scoring_system epss
scoring_elements 0.87176
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790318
reference_id 1790318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790318
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
reference_id 947428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
6
reference_url https://security.gentoo.org/glsa/202407-14
reference_id GLSA-202407-14
reference_type
scores
url https://security.gentoo.org/glsa/202407-14
7
reference_url https://access.redhat.com/errata/RHSA-2020:1497
reference_id RHSA-2020:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1497
8
reference_url https://access.redhat.com/errata/RHSA-2020:3875
reference_id RHSA-2020:3875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3875
fixed_packages
0
url pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2019-15695
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kdt-7mph-j3ej
4
url VCID-58x9-2uk3-6bhp
vulnerability_id VCID-58x9-2uk3-6bhp
summary Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15694.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15694
reference_id
reference_type
scores
0
value 0.06012
scoring_system epss
scoring_elements 0.90663
published_at 2026-04-01T12:55:00Z
1
value 0.06012
scoring_system epss
scoring_elements 0.90668
published_at 2026-04-02T12:55:00Z
2
value 0.06012
scoring_system epss
scoring_elements 0.90678
published_at 2026-04-04T12:55:00Z
3
value 0.06012
scoring_system epss
scoring_elements 0.90687
published_at 2026-04-07T12:55:00Z
4
value 0.06012
scoring_system epss
scoring_elements 0.90698
published_at 2026-04-08T12:55:00Z
5
value 0.06012
scoring_system epss
scoring_elements 0.90703
published_at 2026-04-09T12:55:00Z
6
value 0.06012
scoring_system epss
scoring_elements 0.90712
published_at 2026-04-11T12:55:00Z
7
value 0.06012
scoring_system epss
scoring_elements 0.90713
published_at 2026-04-12T12:55:00Z
8
value 0.06012
scoring_system epss
scoring_elements 0.90709
published_at 2026-04-13T12:55:00Z
9
value 0.06012
scoring_system epss
scoring_elements 0.90728
published_at 2026-04-16T12:55:00Z
10
value 0.06012
scoring_system epss
scoring_elements 0.90726
published_at 2026-04-18T12:55:00Z
11
value 0.06012
scoring_system epss
scoring_elements 0.90723
published_at 2026-04-21T12:55:00Z
12
value 0.06012
scoring_system epss
scoring_elements 0.90736
published_at 2026-04-24T12:55:00Z
13
value 0.06012
scoring_system epss
scoring_elements 0.90737
published_at 2026-04-26T12:55:00Z
14
value 0.06012
scoring_system epss
scoring_elements 0.90732
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790315
reference_id 1790315
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790315
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
reference_id 947428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
6
reference_url https://security.gentoo.org/glsa/202407-14
reference_id GLSA-202407-14
reference_type
scores
url https://security.gentoo.org/glsa/202407-14
7
reference_url https://access.redhat.com/errata/RHSA-2020:1497
reference_id RHSA-2020:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1497
8
reference_url https://access.redhat.com/errata/RHSA-2020:3875
reference_id RHSA-2020:3875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3875
fixed_packages
0
url pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2019-15694
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58x9-2uk3-6bhp
5
url VCID-6ujy-cukz-dqfh
vulnerability_id VCID-6ujy-cukz-dqfh
summary
An integer overflow in TigerVNC might allow remote attackers to
    execute
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8240.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8240
reference_id
reference_type
scores
0
value 0.01094
scoring_system epss
scoring_elements 0.78065
published_at 2026-04-29T12:55:00Z
1
value 0.01094
scoring_system epss
scoring_elements 0.77929
published_at 2026-04-01T12:55:00Z
2
value 0.01094
scoring_system epss
scoring_elements 0.77936
published_at 2026-04-02T12:55:00Z
3
value 0.01094
scoring_system epss
scoring_elements 0.77963
published_at 2026-04-04T12:55:00Z
4
value 0.01094
scoring_system epss
scoring_elements 0.77945
published_at 2026-04-07T12:55:00Z
5
value 0.01094
scoring_system epss
scoring_elements 0.77972
published_at 2026-04-08T12:55:00Z
6
value 0.01094
scoring_system epss
scoring_elements 0.77976
published_at 2026-04-09T12:55:00Z
7
value 0.01094
scoring_system epss
scoring_elements 0.78003
published_at 2026-04-11T12:55:00Z
8
value 0.01094
scoring_system epss
scoring_elements 0.77986
published_at 2026-04-12T12:55:00Z
9
value 0.01094
scoring_system epss
scoring_elements 0.77985
published_at 2026-04-13T12:55:00Z
10
value 0.01094
scoring_system epss
scoring_elements 0.7802
published_at 2026-04-18T12:55:00Z
11
value 0.01094
scoring_system epss
scoring_elements 0.78012
published_at 2026-04-21T12:55:00Z
12
value 0.01094
scoring_system epss
scoring_elements 0.78044
published_at 2026-04-24T12:55:00Z
13
value 0.01094
scoring_system epss
scoring_elements 0.78052
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240
3
reference_url http://seclists.org/oss-sec/2014/q4/278
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q4/278
4
reference_url http://seclists.org/oss-sec/2014/q4/300
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q4/300
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96947
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96947
6
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
7
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
8
reference_url http://www.securityfocus.com/bid/70391
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70391
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1151307
reference_id 1151307
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1151307
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849479
reference_id 849479
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849479
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8240
reference_id CVE-2014-8240
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8240
17
reference_url https://security.gentoo.org/glsa/201612-36
reference_id GLSA-201612-36
reference_type
scores
url https://security.gentoo.org/glsa/201612-36
18
reference_url https://access.redhat.com/errata/RHSA-2015:2233
reference_id RHSA-2015:2233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2233
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-1%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2014-8240
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ujy-cukz-dqfh
6
url VCID-877z-wag9-xufy
vulnerability_id VCID-877z-wag9-xufy
summary tigervnc: NULL pointer dereference flaw in XRegion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8241.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8241
reference_id
reference_type
scores
0
value 0.00695
scoring_system epss
scoring_elements 0.71867
published_at 2026-04-01T12:55:00Z
1
value 0.00695
scoring_system epss
scoring_elements 0.71875
published_at 2026-04-02T12:55:00Z
2
value 0.00695
scoring_system epss
scoring_elements 0.71894
published_at 2026-04-04T12:55:00Z
3
value 0.00695
scoring_system epss
scoring_elements 0.71866
published_at 2026-04-07T12:55:00Z
4
value 0.00695
scoring_system epss
scoring_elements 0.71904
published_at 2026-04-08T12:55:00Z
5
value 0.00695
scoring_system epss
scoring_elements 0.71916
published_at 2026-04-09T12:55:00Z
6
value 0.00695
scoring_system epss
scoring_elements 0.71939
published_at 2026-04-11T12:55:00Z
7
value 0.00695
scoring_system epss
scoring_elements 0.71922
published_at 2026-04-12T12:55:00Z
8
value 0.00695
scoring_system epss
scoring_elements 0.71905
published_at 2026-04-13T12:55:00Z
9
value 0.00695
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-16T12:55:00Z
10
value 0.00695
scoring_system epss
scoring_elements 0.71951
published_at 2026-04-18T12:55:00Z
11
value 0.00695
scoring_system epss
scoring_elements 0.71936
published_at 2026-04-21T12:55:00Z
12
value 0.00695
scoring_system epss
scoring_elements 0.71981
published_at 2026-04-24T12:55:00Z
13
value 0.00695
scoring_system epss
scoring_elements 0.71988
published_at 2026-04-26T12:55:00Z
14
value 0.00695
scoring_system epss
scoring_elements 0.71985
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8241
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1151312
reference_id 1151312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1151312
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849478
reference_id 849478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849478
5
reference_url https://access.redhat.com/errata/RHSA-2015:2233
reference_id RHSA-2015:2233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2233
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-2%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2014-8241
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-877z-wag9-xufy
7
url VCID-c64p-mvgq-h3ab
vulnerability_id VCID-c64p-mvgq-h3ab
summary
Multiple vulnerabilities have been found in TigerVNC, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7394.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7394
reference_id
reference_type
scores
0
value 0.01193
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-29T12:55:00Z
1
value 0.01193
scoring_system epss
scoring_elements 0.78906
published_at 2026-04-24T12:55:00Z
2
value 0.01193
scoring_system epss
scoring_elements 0.78913
published_at 2026-04-26T12:55:00Z
3
value 0.02813
scoring_system epss
scoring_elements 0.86152
published_at 2026-04-21T12:55:00Z
4
value 0.02813
scoring_system epss
scoring_elements 0.86073
published_at 2026-04-01T12:55:00Z
5
value 0.02813
scoring_system epss
scoring_elements 0.86083
published_at 2026-04-02T12:55:00Z
6
value 0.02813
scoring_system epss
scoring_elements 0.86099
published_at 2026-04-07T12:55:00Z
7
value 0.02813
scoring_system epss
scoring_elements 0.86117
published_at 2026-04-08T12:55:00Z
8
value 0.02813
scoring_system epss
scoring_elements 0.86129
published_at 2026-04-09T12:55:00Z
9
value 0.02813
scoring_system epss
scoring_elements 0.86143
published_at 2026-04-11T12:55:00Z
10
value 0.02813
scoring_system epss
scoring_elements 0.86142
published_at 2026-04-12T12:55:00Z
11
value 0.02813
scoring_system epss
scoring_elements 0.86138
published_at 2026-04-13T12:55:00Z
12
value 0.02813
scoring_system epss
scoring_elements 0.86156
published_at 2026-04-16T12:55:00Z
13
value 0.02813
scoring_system epss
scoring_elements 0.86161
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/TigerVNC/tigervnc/pull/440
reference_id
reference_type
scores
url https://github.com/TigerVNC/tigervnc/pull/440
5
reference_url http://www.securityfocus.com/bid/97305
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97305
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1438700
reference_id 1438700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1438700
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
reference_id 859259
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7394
reference_id CVE-2017-7394
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7394
10
reference_url https://security.gentoo.org/glsa/201801-13
reference_id GLSA-201801-13
reference_type
scores
url https://security.gentoo.org/glsa/201801-13
11
reference_url https://access.redhat.com/errata/RHSA-2017:2000
reference_id RHSA-2017:2000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2000
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2017-7394
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c64p-mvgq-h3ab
8
url VCID-eg3c-u9w7-23cj
vulnerability_id VCID-eg3c-u9w7-23cj
summary
Multiple vulnerabilities have been found in TigerVNC, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7392.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7392
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62143
published_at 2026-04-01T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.6231
published_at 2026-04-29T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62305
published_at 2026-04-18T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.6229
published_at 2026-04-21T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62299
published_at 2026-04-24T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62316
published_at 2026-04-26T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62202
published_at 2026-04-02T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62232
published_at 2026-04-04T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62199
published_at 2026-04-07T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62249
published_at 2026-04-08T12:55:00Z
10
value 0.00426
scoring_system epss
scoring_elements 0.62266
published_at 2026-04-09T12:55:00Z
11
value 0.00426
scoring_system epss
scoring_elements 0.62285
published_at 2026-04-11T12:55:00Z
12
value 0.00426
scoring_system epss
scoring_elements 0.62274
published_at 2026-04-12T12:55:00Z
13
value 0.00426
scoring_system epss
scoring_elements 0.62253
published_at 2026-04-13T12:55:00Z
14
value 0.00426
scoring_system epss
scoring_elements 0.62298
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/TigerVNC/tigervnc/pull/441
reference_id
reference_type
scores
url https://github.com/TigerVNC/tigervnc/pull/441
5
reference_url http://www.securityfocus.com/bid/97305
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97305
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1438694
reference_id 1438694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1438694
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
reference_id 859259
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7392
reference_id CVE-2017-7392
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7392
10
reference_url https://security.gentoo.org/glsa/201801-13
reference_id GLSA-201801-13
reference_type
scores
url https://security.gentoo.org/glsa/201801-13
11
reference_url https://access.redhat.com/errata/RHSA-2017:2000
reference_id RHSA-2017:2000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2000
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2017-7392
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eg3c-u9w7-23cj
9
url VCID-kme1-gr1m-zfh8
vulnerability_id VCID-kme1-gr1m-zfh8
summary tigervnc: vncviewer can send password to server without proper validation of the X.509 certificate
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060567.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060567.html
1
reference_url http://openwall.com/lists/oss-security/2011/05/06/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/05/06/2
2
reference_url http://openwall.com/lists/oss-security/2011/05/09/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/05/09/7
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1775.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1775.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1775
reference_id
reference_type
scores
0
value 0.00477
scoring_system epss
scoring_elements 0.64998
published_at 2026-04-29T12:55:00Z
1
value 0.00477
scoring_system epss
scoring_elements 0.64853
published_at 2026-04-01T12:55:00Z
2
value 0.00477
scoring_system epss
scoring_elements 0.64903
published_at 2026-04-02T12:55:00Z
3
value 0.00477
scoring_system epss
scoring_elements 0.64931
published_at 2026-04-04T12:55:00Z
4
value 0.00477
scoring_system epss
scoring_elements 0.64894
published_at 2026-04-07T12:55:00Z
5
value 0.00477
scoring_system epss
scoring_elements 0.64943
published_at 2026-04-08T12:55:00Z
6
value 0.00477
scoring_system epss
scoring_elements 0.64958
published_at 2026-04-09T12:55:00Z
7
value 0.00477
scoring_system epss
scoring_elements 0.64976
published_at 2026-04-11T12:55:00Z
8
value 0.00477
scoring_system epss
scoring_elements 0.64966
published_at 2026-04-12T12:55:00Z
9
value 0.00477
scoring_system epss
scoring_elements 0.64938
published_at 2026-04-13T12:55:00Z
10
value 0.00477
scoring_system epss
scoring_elements 0.64974
published_at 2026-04-16T12:55:00Z
11
value 0.00477
scoring_system epss
scoring_elements 0.64986
published_at 2026-04-18T12:55:00Z
12
value 0.00477
scoring_system epss
scoring_elements 0.6497
published_at 2026-04-21T12:55:00Z
13
value 0.00477
scoring_system epss
scoring_elements 0.64989
published_at 2026-04-24T12:55:00Z
14
value 0.00477
scoring_system epss
scoring_elements 0.65002
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1775
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=702672
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=702672
6
reference_url http://secunia.com/advisories/44939
reference_id
reference_type
scores
url http://secunia.com/advisories/44939
7
reference_url http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01342.html
reference_id
reference_type
scores
url http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01342.html
8
reference_url http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01345.html
reference_id
reference_type
scores
url http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01345.html
9
reference_url http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01347.html
reference_id
reference_type
scores
url http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01347.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2011-0871.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0871.html
11
reference_url http://www.securityfocus.com/bid/47738
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47738
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=702470
reference_id 702470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=702470
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1775
reference_id CVE-2011-1775
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1775
15
reference_url https://access.redhat.com/errata/RHSA-2011:0871
reference_id RHSA-2011:0871
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0871
fixed_packages
0
url pkg:deb/debian/tigervnc@0?distro=trixie
purl pkg:deb/debian/tigervnc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@0%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2011-1775
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kme1-gr1m-zfh8
10
url VCID-p8yq-vpuh-nkg4
vulnerability_id VCID-p8yq-vpuh-nkg4
summary
Multiple vulnerabilities have been found in TigerVNC, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7393.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7393
reference_id
reference_type
scores
0
value 0.01187
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-29T12:55:00Z
1
value 0.01187
scoring_system epss
scoring_elements 0.78853
published_at 2026-04-24T12:55:00Z
2
value 0.01187
scoring_system epss
scoring_elements 0.7886
published_at 2026-04-26T12:55:00Z
3
value 0.02051
scoring_system epss
scoring_elements 0.839
published_at 2026-04-21T12:55:00Z
4
value 0.02051
scoring_system epss
scoring_elements 0.83801
published_at 2026-04-01T12:55:00Z
5
value 0.02051
scoring_system epss
scoring_elements 0.83815
published_at 2026-04-02T12:55:00Z
6
value 0.02051
scoring_system epss
scoring_elements 0.8383
published_at 2026-04-04T12:55:00Z
7
value 0.02051
scoring_system epss
scoring_elements 0.83831
published_at 2026-04-07T12:55:00Z
8
value 0.02051
scoring_system epss
scoring_elements 0.83855
published_at 2026-04-08T12:55:00Z
9
value 0.02051
scoring_system epss
scoring_elements 0.83861
published_at 2026-04-09T12:55:00Z
10
value 0.02051
scoring_system epss
scoring_elements 0.83877
published_at 2026-04-11T12:55:00Z
11
value 0.02051
scoring_system epss
scoring_elements 0.83871
published_at 2026-04-12T12:55:00Z
12
value 0.02051
scoring_system epss
scoring_elements 0.83867
published_at 2026-04-13T12:55:00Z
13
value 0.02051
scoring_system epss
scoring_elements 0.83901
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/TigerVNC/tigervnc/pull/438
reference_id
reference_type
scores
url https://github.com/TigerVNC/tigervnc/pull/438
5
reference_url http://www.securityfocus.com/bid/97305
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97305
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1438697
reference_id 1438697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1438697
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
reference_id 859259
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7393
reference_id CVE-2017-7393
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7393
10
reference_url https://security.gentoo.org/glsa/201801-13
reference_id GLSA-201801-13
reference_type
scores
url https://security.gentoo.org/glsa/201801-13
11
reference_url https://access.redhat.com/errata/RHSA-2017:2000
reference_id RHSA-2017:2000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2000
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2017-7393
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8yq-vpuh-nkg4
11
url VCID-ts81-hqju-7bdu
vulnerability_id VCID-ts81-hqju-7bdu
summary
A buffer overflow in TigerVNC might allow remote attackers to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5581.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5581
reference_id
reference_type
scores
0
value 0.03195
scoring_system epss
scoring_elements 0.86936
published_at 2026-04-01T12:55:00Z
1
value 0.03195
scoring_system epss
scoring_elements 0.86947
published_at 2026-04-02T12:55:00Z
2
value 0.03195
scoring_system epss
scoring_elements 0.86966
published_at 2026-04-04T12:55:00Z
3
value 0.03195
scoring_system epss
scoring_elements 0.86959
published_at 2026-04-07T12:55:00Z
4
value 0.03195
scoring_system epss
scoring_elements 0.86979
published_at 2026-04-08T12:55:00Z
5
value 0.03195
scoring_system epss
scoring_elements 0.86986
published_at 2026-04-09T12:55:00Z
6
value 0.03195
scoring_system epss
scoring_elements 0.86999
published_at 2026-04-11T12:55:00Z
7
value 0.03195
scoring_system epss
scoring_elements 0.86994
published_at 2026-04-12T12:55:00Z
8
value 0.03195
scoring_system epss
scoring_elements 0.86988
published_at 2026-04-13T12:55:00Z
9
value 0.03195
scoring_system epss
scoring_elements 0.87004
published_at 2026-04-16T12:55:00Z
10
value 0.03195
scoring_system epss
scoring_elements 0.87007
published_at 2026-04-18T12:55:00Z
11
value 0.03195
scoring_system epss
scoring_elements 0.87005
published_at 2026-04-21T12:55:00Z
12
value 0.03195
scoring_system epss
scoring_elements 0.87024
published_at 2026-04-24T12:55:00Z
13
value 0.03195
scoring_system epss
scoring_elements 0.8703
published_at 2026-04-26T12:55:00Z
14
value 0.03195
scoring_system epss
scoring_elements 0.87032
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1415712
reference_id 1415712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1415712
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852213
reference_id 852213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852213
6
reference_url https://security.gentoo.org/glsa/201702-19
reference_id GLSA-201702-19
reference_type
scores
url https://security.gentoo.org/glsa/201702-19
7
reference_url https://access.redhat.com/errata/RHSA-2017:0630
reference_id RHSA-2017:0630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0630
8
reference_url https://access.redhat.com/errata/RHSA-2017:2000
reference_id RHSA-2017:2000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2000
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2017-5581
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ts81-hqju-7bdu
12
url VCID-u17b-f4ew-dudp
vulnerability_id VCID-u17b-f4ew-dudp
summary
A buffer overflow in TigerVNC could result in execution of
    arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0011.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0011
reference_id
reference_type
scores
0
value 0.00549
scoring_system epss
scoring_elements 0.67854
published_at 2026-04-01T12:55:00Z
1
value 0.00549
scoring_system epss
scoring_elements 0.67877
published_at 2026-04-02T12:55:00Z
2
value 0.00549
scoring_system epss
scoring_elements 0.67896
published_at 2026-04-04T12:55:00Z
3
value 0.00549
scoring_system epss
scoring_elements 0.67876
published_at 2026-04-07T12:55:00Z
4
value 0.00549
scoring_system epss
scoring_elements 0.67926
published_at 2026-04-08T12:55:00Z
5
value 0.00549
scoring_system epss
scoring_elements 0.6794
published_at 2026-04-09T12:55:00Z
6
value 0.00549
scoring_system epss
scoring_elements 0.67964
published_at 2026-04-11T12:55:00Z
7
value 0.00549
scoring_system epss
scoring_elements 0.6795
published_at 2026-04-12T12:55:00Z
8
value 0.00549
scoring_system epss
scoring_elements 0.67914
published_at 2026-04-13T12:55:00Z
9
value 0.00549
scoring_system epss
scoring_elements 0.67952
published_at 2026-04-16T12:55:00Z
10
value 0.00549
scoring_system epss
scoring_elements 0.67965
published_at 2026-04-18T12:55:00Z
11
value 0.00549
scoring_system epss
scoring_elements 0.67946
published_at 2026-04-21T12:55:00Z
12
value 0.01188
scoring_system epss
scoring_elements 0.78854
published_at 2026-04-24T12:55:00Z
13
value 0.01188
scoring_system epss
scoring_elements 0.7886
published_at 2026-04-26T12:55:00Z
14
value 0.01188
scoring_system epss
scoring_elements 0.78877
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0011
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1050928
reference_id 1050928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1050928
3
reference_url https://security.gentoo.org/glsa/201411-03
reference_id GLSA-201411-03
reference_type
scores
url https://security.gentoo.org/glsa/201411-03
fixed_packages
0
url pkg:deb/debian/tigervnc@0?distro=trixie
purl pkg:deb/debian/tigervnc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@0%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2014-0011
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u17b-f4ew-dudp
13
url VCID-vgaa-3fm8-bbdq
vulnerability_id VCID-vgaa-3fm8-bbdq
summary tigervnc: Heap buffer overflow in TightDecoder::FilterGradient
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15693.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15693
reference_id
reference_type
scores
0
value 0.08956
scoring_system epss
scoring_elements 0.92561
published_at 2026-04-01T12:55:00Z
1
value 0.08956
scoring_system epss
scoring_elements 0.92567
published_at 2026-04-02T12:55:00Z
2
value 0.08956
scoring_system epss
scoring_elements 0.92573
published_at 2026-04-04T12:55:00Z
3
value 0.08956
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-07T12:55:00Z
4
value 0.08956
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-08T12:55:00Z
5
value 0.08956
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-09T12:55:00Z
6
value 0.08956
scoring_system epss
scoring_elements 0.92597
published_at 2026-04-13T12:55:00Z
7
value 0.08956
scoring_system epss
scoring_elements 0.92598
published_at 2026-04-12T12:55:00Z
8
value 0.08956
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-29T12:55:00Z
9
value 0.08956
scoring_system epss
scoring_elements 0.92609
published_at 2026-04-18T12:55:00Z
10
value 0.08956
scoring_system epss
scoring_elements 0.92612
published_at 2026-04-21T12:55:00Z
11
value 0.08956
scoring_system epss
scoring_elements 0.92615
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790313
reference_id 1790313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790313
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
reference_id 947428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
6
reference_url https://access.redhat.com/errata/RHSA-2020:1497
reference_id RHSA-2020:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1497
7
reference_url https://access.redhat.com/errata/RHSA-2020:3875
reference_id RHSA-2020:3875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3875
fixed_packages
0
url pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2019-15693
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgaa-3fm8-bbdq
14
url VCID-vz9s-w84f-efb7
vulnerability_id VCID-vz9s-w84f-efb7
summary
Multiple vulnerabilities have been found in TigerVNC, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10207.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10207
reference_id
reference_type
scores
0
value 0.01689
scoring_system epss
scoring_elements 0.82153
published_at 2026-04-01T12:55:00Z
1
value 0.01689
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-02T12:55:00Z
2
value 0.01689
scoring_system epss
scoring_elements 0.82188
published_at 2026-04-04T12:55:00Z
3
value 0.01689
scoring_system epss
scoring_elements 0.82184
published_at 2026-04-07T12:55:00Z
4
value 0.01689
scoring_system epss
scoring_elements 0.8221
published_at 2026-04-08T12:55:00Z
5
value 0.01689
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-09T12:55:00Z
6
value 0.01689
scoring_system epss
scoring_elements 0.82237
published_at 2026-04-11T12:55:00Z
7
value 0.01689
scoring_system epss
scoring_elements 0.82229
published_at 2026-04-12T12:55:00Z
8
value 0.01689
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-13T12:55:00Z
9
value 0.01689
scoring_system epss
scoring_elements 0.8226
published_at 2026-04-18T12:55:00Z
10
value 0.01689
scoring_system epss
scoring_elements 0.82261
published_at 2026-04-21T12:55:00Z
11
value 0.01689
scoring_system epss
scoring_elements 0.82282
published_at 2026-04-24T12:55:00Z
12
value 0.01689
scoring_system epss
scoring_elements 0.82294
published_at 2026-04-26T12:55:00Z
13
value 0.01689
scoring_system epss
scoring_elements 0.82299
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1418761
reference_id 1418761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1418761
5
reference_url https://security.gentoo.org/glsa/201801-13
reference_id GLSA-201801-13
reference_type
scores
url https://security.gentoo.org/glsa/201801-13
6
reference_url https://access.redhat.com/errata/RHSA-2017:0630
reference_id RHSA-2017:0630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0630
7
reference_url https://access.redhat.com/errata/RHSA-2017:2000
reference_id RHSA-2017:2000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2000
fixed_packages
0
url pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie
purl pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-1%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2016-10207
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vz9s-w84f-efb7
15
url VCID-wspa-k6wk-kqhb
vulnerability_id VCID-wspa-k6wk-kqhb
summary Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15691.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15691
reference_id
reference_type
scores
0
value 0.03684
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-01T12:55:00Z
1
value 0.03684
scoring_system epss
scoring_elements 0.87882
published_at 2026-04-02T12:55:00Z
2
value 0.03684
scoring_system epss
scoring_elements 0.87895
published_at 2026-04-04T12:55:00Z
3
value 0.03684
scoring_system epss
scoring_elements 0.87898
published_at 2026-04-07T12:55:00Z
4
value 0.03684
scoring_system epss
scoring_elements 0.87919
published_at 2026-04-08T12:55:00Z
5
value 0.03684
scoring_system epss
scoring_elements 0.87926
published_at 2026-04-09T12:55:00Z
6
value 0.03684
scoring_system epss
scoring_elements 0.87936
published_at 2026-04-11T12:55:00Z
7
value 0.03684
scoring_system epss
scoring_elements 0.87929
published_at 2026-04-13T12:55:00Z
8
value 0.03684
scoring_system epss
scoring_elements 0.87943
published_at 2026-04-21T12:55:00Z
9
value 0.03684
scoring_system epss
scoring_elements 0.8796
published_at 2026-04-24T12:55:00Z
10
value 0.03684
scoring_system epss
scoring_elements 0.87966
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1789908
reference_id 1789908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1789908
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
reference_id 947428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
6
reference_url https://security.gentoo.org/glsa/202407-14
reference_id GLSA-202407-14
reference_type
scores
url https://security.gentoo.org/glsa/202407-14
7
reference_url https://access.redhat.com/errata/RHSA-2020:1497
reference_id RHSA-2020:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1497
8
reference_url https://access.redhat.com/errata/RHSA-2020:3875
reference_id RHSA-2020:3875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3875
fixed_packages
0
url pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2019-15691
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wspa-k6wk-kqhb
16
url VCID-yvqe-mjea-pud2
vulnerability_id VCID-yvqe-mjea-pud2
summary Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15692.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15692
reference_id
reference_type
scores
0
value 0.05042
scoring_system epss
scoring_elements 0.89719
published_at 2026-04-01T12:55:00Z
1
value 0.05042
scoring_system epss
scoring_elements 0.89722
published_at 2026-04-02T12:55:00Z
2
value 0.05042
scoring_system epss
scoring_elements 0.89737
published_at 2026-04-04T12:55:00Z
3
value 0.05042
scoring_system epss
scoring_elements 0.89739
published_at 2026-04-07T12:55:00Z
4
value 0.05042
scoring_system epss
scoring_elements 0.89756
published_at 2026-04-08T12:55:00Z
5
value 0.05042
scoring_system epss
scoring_elements 0.89763
published_at 2026-04-09T12:55:00Z
6
value 0.05042
scoring_system epss
scoring_elements 0.89769
published_at 2026-04-11T12:55:00Z
7
value 0.05042
scoring_system epss
scoring_elements 0.89768
published_at 2026-04-12T12:55:00Z
8
value 0.05042
scoring_system epss
scoring_elements 0.89761
published_at 2026-04-13T12:55:00Z
9
value 0.05042
scoring_system epss
scoring_elements 0.89776
published_at 2026-04-16T12:55:00Z
10
value 0.05042
scoring_system epss
scoring_elements 0.89777
published_at 2026-04-18T12:55:00Z
11
value 0.05042
scoring_system epss
scoring_elements 0.89771
published_at 2026-04-21T12:55:00Z
12
value 0.05042
scoring_system epss
scoring_elements 0.89785
published_at 2026-04-24T12:55:00Z
13
value 0.05042
scoring_system epss
scoring_elements 0.89787
published_at 2026-04-26T12:55:00Z
14
value 0.05042
scoring_system epss
scoring_elements 0.89786
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1789527
reference_id 1789527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1789527
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
reference_id 947428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
6
reference_url https://security.gentoo.org/glsa/202407-14
reference_id GLSA-202407-14
reference_type
scores
url https://security.gentoo.org/glsa/202407-14
7
reference_url https://access.redhat.com/errata/RHSA-2020:1497
reference_id RHSA-2020:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1497
8
reference_url https://access.redhat.com/errata/RHSA-2020:3875
reference_id RHSA-2020:3875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3875
fixed_packages
0
url pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
purl pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie
3
url pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie
aliases CVE-2019-15692
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvqe-mjea-pud2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie