Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
Typedeb
Namespacedebian
Nameveyon
Version4.1.4+repack1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.1.7+repack1-1
Latest_non_vulnerable_version4.9.7+repack1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1d5d-ajfs-tffv
vulnerability_id VCID-1d5d-ajfs-tffv
summary
Multiple vulnerabilities have been found in
    LibVNCServer/LibVNCClient, the worst of which allows remote attackers to
    execute arbitrary code when connecting to a malicious server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9941
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74598
published_at 2026-04-01T12:55:00Z
1
value 0.00836
scoring_system epss
scoring_elements 0.74715
published_at 2026-04-24T12:55:00Z
2
value 0.00836
scoring_system epss
scoring_elements 0.7468
published_at 2026-04-21T12:55:00Z
3
value 0.00836
scoring_system epss
scoring_elements 0.74688
published_at 2026-04-18T12:55:00Z
4
value 0.00836
scoring_system epss
scoring_elements 0.74602
published_at 2026-04-02T12:55:00Z
5
value 0.00836
scoring_system epss
scoring_elements 0.74628
published_at 2026-04-04T12:55:00Z
6
value 0.00836
scoring_system epss
scoring_elements 0.74603
published_at 2026-04-07T12:55:00Z
7
value 0.00836
scoring_system epss
scoring_elements 0.74634
published_at 2026-04-08T12:55:00Z
8
value 0.00836
scoring_system epss
scoring_elements 0.74649
published_at 2026-04-09T12:55:00Z
9
value 0.00836
scoring_system epss
scoring_elements 0.74672
published_at 2026-04-11T12:55:00Z
10
value 0.00836
scoring_system epss
scoring_elements 0.74651
published_at 2026-04-12T12:55:00Z
11
value 0.00836
scoring_system epss
scoring_elements 0.74643
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9941
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1410166
reference_id 1410166
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1410166
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007
reference_id 850007
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007
7
reference_url https://security.archlinux.org/ASA-201701-20
reference_id ASA-201701-20
reference_type
scores
url https://security.archlinux.org/ASA-201701-20
8
reference_url https://security.archlinux.org/AVG-124
reference_id AVG-124
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-124
9
reference_url https://security.gentoo.org/glsa/201702-24
reference_id GLSA-201702-24
reference_type
scores
url https://security.gentoo.org/glsa/201702-24
10
reference_url https://usn.ubuntu.com/3171-1/
reference_id USN-3171-1
reference_type
scores
url https://usn.ubuntu.com/3171-1/
11
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2016-9941
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d5d-ajfs-tffv
1
url VCID-377b-31s1-b3ek
vulnerability_id VCID-377b-31s1-b3ek
summary
Multiple vulnerabilities have been found in
    LibVNCServer/LibVNCClient, the worst of which allows remote attackers to
    execute arbitrary code when connecting to a malicious server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9942
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74598
published_at 2026-04-01T12:55:00Z
1
value 0.00836
scoring_system epss
scoring_elements 0.74715
published_at 2026-04-24T12:55:00Z
2
value 0.00836
scoring_system epss
scoring_elements 0.7468
published_at 2026-04-21T12:55:00Z
3
value 0.00836
scoring_system epss
scoring_elements 0.74688
published_at 2026-04-18T12:55:00Z
4
value 0.00836
scoring_system epss
scoring_elements 0.74602
published_at 2026-04-02T12:55:00Z
5
value 0.00836
scoring_system epss
scoring_elements 0.74628
published_at 2026-04-04T12:55:00Z
6
value 0.00836
scoring_system epss
scoring_elements 0.74603
published_at 2026-04-07T12:55:00Z
7
value 0.00836
scoring_system epss
scoring_elements 0.74634
published_at 2026-04-08T12:55:00Z
8
value 0.00836
scoring_system epss
scoring_elements 0.74649
published_at 2026-04-09T12:55:00Z
9
value 0.00836
scoring_system epss
scoring_elements 0.74672
published_at 2026-04-11T12:55:00Z
10
value 0.00836
scoring_system epss
scoring_elements 0.74651
published_at 2026-04-12T12:55:00Z
11
value 0.00836
scoring_system epss
scoring_elements 0.74643
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1410168
reference_id 1410168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1410168
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008
reference_id 850008
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008
7
reference_url https://security.archlinux.org/ASA-201701-20
reference_id ASA-201701-20
reference_type
scores
url https://security.archlinux.org/ASA-201701-20
8
reference_url https://security.archlinux.org/AVG-124
reference_id AVG-124
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-124
9
reference_url https://security.gentoo.org/glsa/201702-24
reference_id GLSA-201702-24
reference_type
scores
url https://security.gentoo.org/glsa/201702-24
10
reference_url https://usn.ubuntu.com/3171-1/
reference_id USN-3171-1
reference_type
scores
url https://usn.ubuntu.com/3171-1/
11
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2016-9942
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-377b-31s1-b3ek
2
url VCID-3817-suhy-xfhd
vulnerability_id VCID-3817-suhy-xfhd
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20020
reference_id
reference_type
scores
0
value 0.2103
scoring_system epss
scoring_elements 0.95607
published_at 2026-04-01T12:55:00Z
1
value 0.2103
scoring_system epss
scoring_elements 0.95616
published_at 2026-04-02T12:55:00Z
2
value 0.2103
scoring_system epss
scoring_elements 0.95621
published_at 2026-04-04T12:55:00Z
3
value 0.2103
scoring_system epss
scoring_elements 0.95624
published_at 2026-04-07T12:55:00Z
4
value 0.2103
scoring_system epss
scoring_elements 0.95632
published_at 2026-04-08T12:55:00Z
5
value 0.2103
scoring_system epss
scoring_elements 0.95636
published_at 2026-04-09T12:55:00Z
6
value 0.2103
scoring_system epss
scoring_elements 0.95641
published_at 2026-04-11T12:55:00Z
7
value 0.2103
scoring_system epss
scoring_elements 0.9564
published_at 2026-04-12T12:55:00Z
8
value 0.2103
scoring_system epss
scoring_elements 0.95643
published_at 2026-04-13T12:55:00Z
9
value 0.2103
scoring_system epss
scoring_elements 0.95651
published_at 2026-04-16T12:55:00Z
10
value 0.2103
scoring_system epss
scoring_elements 0.95655
published_at 2026-04-18T12:55:00Z
11
value 0.2103
scoring_system epss
scoring_elements 0.95656
published_at 2026-04-21T12:55:00Z
12
value 0.2103
scoring_system epss
scoring_elements 0.95657
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661117
reference_id 1661117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661117
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20020
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3817-suhy-xfhd
3
url VCID-9nha-t527-rfhs
vulnerability_id VCID-9nha-t527-rfhs
summary
Multiple vulnerabilities have been found in LibVNCServer, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20023
reference_id
reference_type
scores
0
value 0.00856
scoring_system epss
scoring_elements 0.74918
published_at 2026-04-01T12:55:00Z
1
value 0.00856
scoring_system epss
scoring_elements 0.74921
published_at 2026-04-02T12:55:00Z
2
value 0.00856
scoring_system epss
scoring_elements 0.7495
published_at 2026-04-04T12:55:00Z
3
value 0.00856
scoring_system epss
scoring_elements 0.74924
published_at 2026-04-07T12:55:00Z
4
value 0.00856
scoring_system epss
scoring_elements 0.74957
published_at 2026-04-08T12:55:00Z
5
value 0.00856
scoring_system epss
scoring_elements 0.74969
published_at 2026-04-09T12:55:00Z
6
value 0.00856
scoring_system epss
scoring_elements 0.74992
published_at 2026-04-11T12:55:00Z
7
value 0.00856
scoring_system epss
scoring_elements 0.74971
published_at 2026-04-12T12:55:00Z
8
value 0.00856
scoring_system epss
scoring_elements 0.74961
published_at 2026-04-13T12:55:00Z
9
value 0.00856
scoring_system epss
scoring_elements 0.74998
published_at 2026-04-16T12:55:00Z
10
value 0.00856
scoring_system epss
scoring_elements 0.75005
published_at 2026-04-18T12:55:00Z
11
value 0.00856
scoring_system epss
scoring_elements 0.74995
published_at 2026-04-21T12:55:00Z
12
value 0.00856
scoring_system epss
scoring_elements 0.75033
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661128
reference_id 1661128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661128
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
16
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
17
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
18
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20023
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nha-t527-rfhs
4
url VCID-bngs-4nkn-rbh1
vulnerability_id VCID-bngs-4nkn-rbh1
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20022
reference_id
reference_type
scores
0
value 0.06177
scoring_system epss
scoring_elements 0.9079
published_at 2026-04-01T12:55:00Z
1
value 0.06177
scoring_system epss
scoring_elements 0.90796
published_at 2026-04-02T12:55:00Z
2
value 0.06177
scoring_system epss
scoring_elements 0.90808
published_at 2026-04-04T12:55:00Z
3
value 0.06177
scoring_system epss
scoring_elements 0.90818
published_at 2026-04-07T12:55:00Z
4
value 0.06177
scoring_system epss
scoring_elements 0.90829
published_at 2026-04-08T12:55:00Z
5
value 0.06177
scoring_system epss
scoring_elements 0.90836
published_at 2026-04-09T12:55:00Z
6
value 0.06177
scoring_system epss
scoring_elements 0.90844
published_at 2026-04-12T12:55:00Z
7
value 0.06177
scoring_system epss
scoring_elements 0.90842
published_at 2026-04-13T12:55:00Z
8
value 0.06177
scoring_system epss
scoring_elements 0.90866
published_at 2026-04-16T12:55:00Z
9
value 0.06177
scoring_system epss
scoring_elements 0.90864
published_at 2026-04-18T12:55:00Z
10
value 0.06177
scoring_system epss
scoring_elements 0.90863
published_at 2026-04-21T12:55:00Z
11
value 0.06177
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661123
reference_id 1661123
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661123
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20022
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bngs-4nkn-rbh1
5
url VCID-du88-cbhp-rkcc
vulnerability_id VCID-du88-cbhp-rkcc
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20021
reference_id
reference_type
scores
0
value 0.02552
scoring_system epss
scoring_elements 0.85421
published_at 2026-04-01T12:55:00Z
1
value 0.02552
scoring_system epss
scoring_elements 0.85433
published_at 2026-04-02T12:55:00Z
2
value 0.02552
scoring_system epss
scoring_elements 0.85453
published_at 2026-04-04T12:55:00Z
3
value 0.02552
scoring_system epss
scoring_elements 0.85456
published_at 2026-04-07T12:55:00Z
4
value 0.02552
scoring_system epss
scoring_elements 0.85477
published_at 2026-04-08T12:55:00Z
5
value 0.02552
scoring_system epss
scoring_elements 0.85485
published_at 2026-04-09T12:55:00Z
6
value 0.02552
scoring_system epss
scoring_elements 0.85499
published_at 2026-04-11T12:55:00Z
7
value 0.02552
scoring_system epss
scoring_elements 0.85498
published_at 2026-04-12T12:55:00Z
8
value 0.02552
scoring_system epss
scoring_elements 0.85494
published_at 2026-04-13T12:55:00Z
9
value 0.02552
scoring_system epss
scoring_elements 0.85518
published_at 2026-04-16T12:55:00Z
10
value 0.02552
scoring_system epss
scoring_elements 0.85522
published_at 2026-04-18T12:55:00Z
11
value 0.02552
scoring_system epss
scoring_elements 0.85519
published_at 2026-04-21T12:55:00Z
12
value 0.02552
scoring_system epss
scoring_elements 0.85541
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661120
reference_id 1661120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661120
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20021
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-du88-cbhp-rkcc
6
url VCID-nrnp-2yeq-y7ap
vulnerability_id VCID-nrnp-2yeq-y7ap
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6052
reference_id
reference_type
scores
0
value 0.0524
scoring_system epss
scoring_elements 0.89999
published_at 2026-04-24T12:55:00Z
1
value 0.0524
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-01T12:55:00Z
2
value 0.0524
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-02T12:55:00Z
3
value 0.0524
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-04T12:55:00Z
4
value 0.0524
scoring_system epss
scoring_elements 0.8995
published_at 2026-04-07T12:55:00Z
5
value 0.0524
scoring_system epss
scoring_elements 0.89966
published_at 2026-04-08T12:55:00Z
6
value 0.0524
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-13T12:55:00Z
7
value 0.0524
scoring_system epss
scoring_elements 0.89979
published_at 2026-04-11T12:55:00Z
8
value 0.0524
scoring_system epss
scoring_elements 0.89977
published_at 2026-04-12T12:55:00Z
9
value 0.0524
scoring_system epss
scoring_elements 0.89985
published_at 2026-04-16T12:55:00Z
10
value 0.0524
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-18T12:55:00Z
11
value 0.0524
scoring_system epss
scoring_elements 0.89982
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6052
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
8
reference_url http://seclists.org/oss-sec/2014/q3/639
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q3/639
9
reference_url http://secunia.com/advisories/61506
reference_id
reference_type
scores
url http://secunia.com/advisories/61506
10
reference_url http://secunia.com/advisories/61682
reference_id
reference_type
scores
url http://secunia.com/advisories/61682
11
reference_url https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812
reference_id
reference_type
scores
url https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812
12
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
13
reference_url http://ubuntu.com/usn/usn-2365-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-2365-1
14
reference_url http://www.debian.org/security/2014/dsa-3081
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3081
15
reference_url http://www.ocert.org/advisories/ocert-2014-007.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2014-007.html
16
reference_url http://www.openwall.com/lists/oss-security/2014/09/25/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/25/11
17
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
18
reference_url http://www.securityfocus.com/bid/70091
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70091
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1144288
reference_id 1144288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1144288
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
reference_id 762745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6052
reference_id CVE-2014-6052
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-6052
27
reference_url https://security.gentoo.org/glsa/201507-07
reference_id GLSA-201507-07
reference_type
scores
url https://security.gentoo.org/glsa/201507-07
28
reference_url https://access.redhat.com/errata/RHSA-2014:1826
reference_id RHSA-2014:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1826
29
reference_url https://usn.ubuntu.com/2365-1/
reference_id USN-2365-1
reference_type
scores
url https://usn.ubuntu.com/2365-1/
30
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2014-6052
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrnp-2yeq-y7ap
7
url VCID-q89b-2emb-j3br
vulnerability_id VCID-q89b-2emb-j3br
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20024
reference_id
reference_type
scores
0
value 0.03729
scoring_system epss
scoring_elements 0.87937
published_at 2026-04-01T12:55:00Z
1
value 0.03729
scoring_system epss
scoring_elements 0.87947
published_at 2026-04-02T12:55:00Z
2
value 0.03729
scoring_system epss
scoring_elements 0.8796
published_at 2026-04-04T12:55:00Z
3
value 0.03729
scoring_system epss
scoring_elements 0.87964
published_at 2026-04-07T12:55:00Z
4
value 0.03729
scoring_system epss
scoring_elements 0.87984
published_at 2026-04-08T12:55:00Z
5
value 0.03729
scoring_system epss
scoring_elements 0.87991
published_at 2026-04-09T12:55:00Z
6
value 0.03729
scoring_system epss
scoring_elements 0.88002
published_at 2026-04-11T12:55:00Z
7
value 0.03729
scoring_system epss
scoring_elements 0.87995
published_at 2026-04-12T12:55:00Z
8
value 0.03729
scoring_system epss
scoring_elements 0.87994
published_at 2026-04-13T12:55:00Z
9
value 0.03729
scoring_system epss
scoring_elements 0.88008
published_at 2026-04-16T12:55:00Z
10
value 0.03729
scoring_system epss
scoring_elements 0.88007
published_at 2026-04-21T12:55:00Z
11
value 0.03729
scoring_system epss
scoring_elements 0.88023
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20024
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661132
reference_id 1661132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661132
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20024
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q89b-2emb-j3br
8
url VCID-ug79-puqk-33ce
vulnerability_id VCID-ug79-puqk-33ce
summary
An integer overflow in TigerVNC might allow remote attackers to
    execute
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-0113.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0113.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6051
reference_id
reference_type
scores
0
value 0.06605
scoring_system epss
scoring_elements 0.91213
published_at 2026-04-24T12:55:00Z
1
value 0.06605
scoring_system epss
scoring_elements 0.91123
published_at 2026-04-01T12:55:00Z
2
value 0.06605
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-02T12:55:00Z
3
value 0.06605
scoring_system epss
scoring_elements 0.91136
published_at 2026-04-04T12:55:00Z
4
value 0.06605
scoring_system epss
scoring_elements 0.91144
published_at 2026-04-07T12:55:00Z
5
value 0.06605
scoring_system epss
scoring_elements 0.91157
published_at 2026-04-08T12:55:00Z
6
value 0.06605
scoring_system epss
scoring_elements 0.91164
published_at 2026-04-09T12:55:00Z
7
value 0.06605
scoring_system epss
scoring_elements 0.91171
published_at 2026-04-11T12:55:00Z
8
value 0.06605
scoring_system epss
scoring_elements 0.91174
published_at 2026-04-12T12:55:00Z
9
value 0.06605
scoring_system epss
scoring_elements 0.91173
published_at 2026-04-13T12:55:00Z
10
value 0.06605
scoring_system epss
scoring_elements 0.91197
published_at 2026-04-18T12:55:00Z
11
value 0.06605
scoring_system epss
scoring_elements 0.912
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6051
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
11
reference_url http://seclists.org/oss-sec/2014/q3/639
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q3/639
12
reference_url http://secunia.com/advisories/61506
reference_id
reference_type
scores
url http://secunia.com/advisories/61506
13
reference_url https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
reference_id
reference_type
scores
url https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
14
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
15
reference_url https://www.kde.org/info/security/advisory-20140923-1.txt
reference_id
reference_type
scores
url https://www.kde.org/info/security/advisory-20140923-1.txt
16
reference_url http://www.debian.org/security/2014/dsa-3081
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3081
17
reference_url http://www.ocert.org/advisories/ocert-2014-007.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2014-007.html
18
reference_url http://www.openwall.com/lists/oss-security/2014/09/25/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/25/11
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
20
reference_url http://www.securityfocus.com/bid/70093
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70093
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1144287
reference_id 1144287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1144287
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
reference_id 762745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6051
reference_id CVE-2014-6051
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-6051
31
reference_url https://security.gentoo.org/glsa/201507-07
reference_id GLSA-201507-07
reference_type
scores
url https://security.gentoo.org/glsa/201507-07
32
reference_url https://security.gentoo.org/glsa/201612-36
reference_id GLSA-201612-36
reference_type
scores
url https://security.gentoo.org/glsa/201612-36
33
reference_url https://access.redhat.com/errata/RHSA-2014:1826
reference_id RHSA-2014:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1826
34
reference_url https://access.redhat.com/errata/RHSA-2015:0113
reference_id RHSA-2015:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0113
35
reference_url https://usn.ubuntu.com/2365-1/
reference_id USN-2365-1
reference_type
scores
url https://usn.ubuntu.com/2365-1/
36
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2014-6051
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ug79-puqk-33ce
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie