Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
Typedeb
Namespacedebian
Nameveyon
Version4.9.7+repack1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1d5d-ajfs-tffv
vulnerability_id VCID-1d5d-ajfs-tffv
summary
Multiple vulnerabilities have been found in
    LibVNCServer/LibVNCClient, the worst of which allows remote attackers to
    execute arbitrary code when connecting to a malicious server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9941
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74598
published_at 2026-04-01T12:55:00Z
1
value 0.00836
scoring_system epss
scoring_elements 0.74688
published_at 2026-04-18T12:55:00Z
2
value 0.00836
scoring_system epss
scoring_elements 0.74643
published_at 2026-04-13T12:55:00Z
3
value 0.00836
scoring_system epss
scoring_elements 0.7468
published_at 2026-04-21T12:55:00Z
4
value 0.00836
scoring_system epss
scoring_elements 0.74602
published_at 2026-04-02T12:55:00Z
5
value 0.00836
scoring_system epss
scoring_elements 0.74628
published_at 2026-04-04T12:55:00Z
6
value 0.00836
scoring_system epss
scoring_elements 0.74603
published_at 2026-04-07T12:55:00Z
7
value 0.00836
scoring_system epss
scoring_elements 0.74634
published_at 2026-04-08T12:55:00Z
8
value 0.00836
scoring_system epss
scoring_elements 0.74649
published_at 2026-04-09T12:55:00Z
9
value 0.00836
scoring_system epss
scoring_elements 0.74672
published_at 2026-04-11T12:55:00Z
10
value 0.00836
scoring_system epss
scoring_elements 0.74651
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9941
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1410166
reference_id 1410166
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1410166
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007
reference_id 850007
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007
7
reference_url https://security.archlinux.org/ASA-201701-20
reference_id ASA-201701-20
reference_type
scores
url https://security.archlinux.org/ASA-201701-20
8
reference_url https://security.archlinux.org/AVG-124
reference_id AVG-124
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-124
9
reference_url https://security.gentoo.org/glsa/201702-24
reference_id GLSA-201702-24
reference_type
scores
url https://security.gentoo.org/glsa/201702-24
10
reference_url https://usn.ubuntu.com/3171-1/
reference_id USN-3171-1
reference_type
scores
url https://usn.ubuntu.com/3171-1/
11
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2016-9941
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d5d-ajfs-tffv
1
url VCID-377b-31s1-b3ek
vulnerability_id VCID-377b-31s1-b3ek
summary
Multiple vulnerabilities have been found in
    LibVNCServer/LibVNCClient, the worst of which allows remote attackers to
    execute arbitrary code when connecting to a malicious server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9942
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74598
published_at 2026-04-01T12:55:00Z
1
value 0.00836
scoring_system epss
scoring_elements 0.74688
published_at 2026-04-18T12:55:00Z
2
value 0.00836
scoring_system epss
scoring_elements 0.74643
published_at 2026-04-13T12:55:00Z
3
value 0.00836
scoring_system epss
scoring_elements 0.7468
published_at 2026-04-21T12:55:00Z
4
value 0.00836
scoring_system epss
scoring_elements 0.74602
published_at 2026-04-02T12:55:00Z
5
value 0.00836
scoring_system epss
scoring_elements 0.74628
published_at 2026-04-04T12:55:00Z
6
value 0.00836
scoring_system epss
scoring_elements 0.74603
published_at 2026-04-07T12:55:00Z
7
value 0.00836
scoring_system epss
scoring_elements 0.74634
published_at 2026-04-08T12:55:00Z
8
value 0.00836
scoring_system epss
scoring_elements 0.74649
published_at 2026-04-09T12:55:00Z
9
value 0.00836
scoring_system epss
scoring_elements 0.74672
published_at 2026-04-11T12:55:00Z
10
value 0.00836
scoring_system epss
scoring_elements 0.74651
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1410168
reference_id 1410168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1410168
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008
reference_id 850008
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008
7
reference_url https://security.archlinux.org/ASA-201701-20
reference_id ASA-201701-20
reference_type
scores
url https://security.archlinux.org/ASA-201701-20
8
reference_url https://security.archlinux.org/AVG-124
reference_id AVG-124
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-124
9
reference_url https://security.gentoo.org/glsa/201702-24
reference_id GLSA-201702-24
reference_type
scores
url https://security.gentoo.org/glsa/201702-24
10
reference_url https://usn.ubuntu.com/3171-1/
reference_id USN-3171-1
reference_type
scores
url https://usn.ubuntu.com/3171-1/
11
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2016-9942
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-377b-31s1-b3ek
2
url VCID-3817-suhy-xfhd
vulnerability_id VCID-3817-suhy-xfhd
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20020
reference_id
reference_type
scores
0
value 0.2103
scoring_system epss
scoring_elements 0.95607
published_at 2026-04-01T12:55:00Z
1
value 0.2103
scoring_system epss
scoring_elements 0.95616
published_at 2026-04-02T12:55:00Z
2
value 0.2103
scoring_system epss
scoring_elements 0.95621
published_at 2026-04-04T12:55:00Z
3
value 0.2103
scoring_system epss
scoring_elements 0.95624
published_at 2026-04-07T12:55:00Z
4
value 0.2103
scoring_system epss
scoring_elements 0.95632
published_at 2026-04-08T12:55:00Z
5
value 0.2103
scoring_system epss
scoring_elements 0.95636
published_at 2026-04-09T12:55:00Z
6
value 0.2103
scoring_system epss
scoring_elements 0.95641
published_at 2026-04-11T12:55:00Z
7
value 0.2103
scoring_system epss
scoring_elements 0.9564
published_at 2026-04-12T12:55:00Z
8
value 0.2103
scoring_system epss
scoring_elements 0.95643
published_at 2026-04-13T12:55:00Z
9
value 0.2103
scoring_system epss
scoring_elements 0.95651
published_at 2026-04-16T12:55:00Z
10
value 0.2103
scoring_system epss
scoring_elements 0.95655
published_at 2026-04-18T12:55:00Z
11
value 0.2103
scoring_system epss
scoring_elements 0.95656
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661117
reference_id 1661117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661117
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20020
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3817-suhy-xfhd
3
url VCID-6gg4-xtn1-3ba9
vulnerability_id VCID-6gg4-xtn1-3ba9
summary On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15261
reference_id
reference_type
scores
0
value 0.08057
scoring_system epss
scoring_elements 0.92097
published_at 2026-04-01T12:55:00Z
1
value 0.08057
scoring_system epss
scoring_elements 0.92105
published_at 2026-04-02T12:55:00Z
2
value 0.08057
scoring_system epss
scoring_elements 0.92111
published_at 2026-04-04T12:55:00Z
3
value 0.08057
scoring_system epss
scoring_elements 0.92116
published_at 2026-04-07T12:55:00Z
4
value 0.08057
scoring_system epss
scoring_elements 0.92127
published_at 2026-04-08T12:55:00Z
5
value 0.08057
scoring_system epss
scoring_elements 0.9213
published_at 2026-04-13T12:55:00Z
6
value 0.08057
scoring_system epss
scoring_elements 0.92134
published_at 2026-04-12T12:55:00Z
7
value 0.08057
scoring_system epss
scoring_elements 0.92141
published_at 2026-04-16T12:55:00Z
8
value 0.08057
scoring_system epss
scoring_elements 0.92138
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15261
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt
reference_id CVE-2020-15261
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt
fixed_packages
0
url pkg:deb/debian/veyon@0?distro=trixie
purl pkg:deb/debian/veyon@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@0%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2020-15261
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gg4-xtn1-3ba9
4
url VCID-9nha-t527-rfhs
vulnerability_id VCID-9nha-t527-rfhs
summary
Multiple vulnerabilities have been found in LibVNCServer, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20023
reference_id
reference_type
scores
0
value 0.00856
scoring_system epss
scoring_elements 0.74918
published_at 2026-04-01T12:55:00Z
1
value 0.00856
scoring_system epss
scoring_elements 0.74921
published_at 2026-04-02T12:55:00Z
2
value 0.00856
scoring_system epss
scoring_elements 0.7495
published_at 2026-04-04T12:55:00Z
3
value 0.00856
scoring_system epss
scoring_elements 0.74924
published_at 2026-04-07T12:55:00Z
4
value 0.00856
scoring_system epss
scoring_elements 0.74957
published_at 2026-04-08T12:55:00Z
5
value 0.00856
scoring_system epss
scoring_elements 0.74969
published_at 2026-04-09T12:55:00Z
6
value 0.00856
scoring_system epss
scoring_elements 0.74992
published_at 2026-04-11T12:55:00Z
7
value 0.00856
scoring_system epss
scoring_elements 0.74971
published_at 2026-04-12T12:55:00Z
8
value 0.00856
scoring_system epss
scoring_elements 0.74961
published_at 2026-04-13T12:55:00Z
9
value 0.00856
scoring_system epss
scoring_elements 0.74998
published_at 2026-04-16T12:55:00Z
10
value 0.00856
scoring_system epss
scoring_elements 0.75005
published_at 2026-04-18T12:55:00Z
11
value 0.00856
scoring_system epss
scoring_elements 0.74995
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661128
reference_id 1661128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661128
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
16
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
17
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
18
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20023
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nha-t527-rfhs
5
url VCID-bngs-4nkn-rbh1
vulnerability_id VCID-bngs-4nkn-rbh1
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20022
reference_id
reference_type
scores
0
value 0.06177
scoring_system epss
scoring_elements 0.9079
published_at 2026-04-01T12:55:00Z
1
value 0.06177
scoring_system epss
scoring_elements 0.90796
published_at 2026-04-02T12:55:00Z
2
value 0.06177
scoring_system epss
scoring_elements 0.90808
published_at 2026-04-04T12:55:00Z
3
value 0.06177
scoring_system epss
scoring_elements 0.90818
published_at 2026-04-07T12:55:00Z
4
value 0.06177
scoring_system epss
scoring_elements 0.90829
published_at 2026-04-08T12:55:00Z
5
value 0.06177
scoring_system epss
scoring_elements 0.90836
published_at 2026-04-09T12:55:00Z
6
value 0.06177
scoring_system epss
scoring_elements 0.90844
published_at 2026-04-12T12:55:00Z
7
value 0.06177
scoring_system epss
scoring_elements 0.90842
published_at 2026-04-13T12:55:00Z
8
value 0.06177
scoring_system epss
scoring_elements 0.90866
published_at 2026-04-16T12:55:00Z
9
value 0.06177
scoring_system epss
scoring_elements 0.90864
published_at 2026-04-18T12:55:00Z
10
value 0.06177
scoring_system epss
scoring_elements 0.90863
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661123
reference_id 1661123
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661123
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20022
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bngs-4nkn-rbh1
6
url VCID-du88-cbhp-rkcc
vulnerability_id VCID-du88-cbhp-rkcc
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20021
reference_id
reference_type
scores
0
value 0.02552
scoring_system epss
scoring_elements 0.85421
published_at 2026-04-01T12:55:00Z
1
value 0.02552
scoring_system epss
scoring_elements 0.85433
published_at 2026-04-02T12:55:00Z
2
value 0.02552
scoring_system epss
scoring_elements 0.85453
published_at 2026-04-04T12:55:00Z
3
value 0.02552
scoring_system epss
scoring_elements 0.85456
published_at 2026-04-07T12:55:00Z
4
value 0.02552
scoring_system epss
scoring_elements 0.85477
published_at 2026-04-08T12:55:00Z
5
value 0.02552
scoring_system epss
scoring_elements 0.85485
published_at 2026-04-09T12:55:00Z
6
value 0.02552
scoring_system epss
scoring_elements 0.85499
published_at 2026-04-11T12:55:00Z
7
value 0.02552
scoring_system epss
scoring_elements 0.85498
published_at 2026-04-12T12:55:00Z
8
value 0.02552
scoring_system epss
scoring_elements 0.85494
published_at 2026-04-13T12:55:00Z
9
value 0.02552
scoring_system epss
scoring_elements 0.85518
published_at 2026-04-16T12:55:00Z
10
value 0.02552
scoring_system epss
scoring_elements 0.85522
published_at 2026-04-18T12:55:00Z
11
value 0.02552
scoring_system epss
scoring_elements 0.85519
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661120
reference_id 1661120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661120
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20021
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-du88-cbhp-rkcc
7
url VCID-nrnp-2yeq-y7ap
vulnerability_id VCID-nrnp-2yeq-y7ap
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6052
reference_id
reference_type
scores
0
value 0.0524
scoring_system epss
scoring_elements 0.89982
published_at 2026-04-21T12:55:00Z
1
value 0.0524
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-01T12:55:00Z
2
value 0.0524
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-02T12:55:00Z
3
value 0.0524
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-04T12:55:00Z
4
value 0.0524
scoring_system epss
scoring_elements 0.8995
published_at 2026-04-07T12:55:00Z
5
value 0.0524
scoring_system epss
scoring_elements 0.89966
published_at 2026-04-08T12:55:00Z
6
value 0.0524
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-13T12:55:00Z
7
value 0.0524
scoring_system epss
scoring_elements 0.89979
published_at 2026-04-11T12:55:00Z
8
value 0.0524
scoring_system epss
scoring_elements 0.89977
published_at 2026-04-12T12:55:00Z
9
value 0.0524
scoring_system epss
scoring_elements 0.89985
published_at 2026-04-16T12:55:00Z
10
value 0.0524
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6052
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
8
reference_url http://seclists.org/oss-sec/2014/q3/639
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q3/639
9
reference_url http://secunia.com/advisories/61506
reference_id
reference_type
scores
url http://secunia.com/advisories/61506
10
reference_url http://secunia.com/advisories/61682
reference_id
reference_type
scores
url http://secunia.com/advisories/61682
11
reference_url https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812
reference_id
reference_type
scores
url https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812
12
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
13
reference_url http://ubuntu.com/usn/usn-2365-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-2365-1
14
reference_url http://www.debian.org/security/2014/dsa-3081
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3081
15
reference_url http://www.ocert.org/advisories/ocert-2014-007.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2014-007.html
16
reference_url http://www.openwall.com/lists/oss-security/2014/09/25/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/25/11
17
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
18
reference_url http://www.securityfocus.com/bid/70091
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70091
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1144288
reference_id 1144288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1144288
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
reference_id 762745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6052
reference_id CVE-2014-6052
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-6052
27
reference_url https://security.gentoo.org/glsa/201507-07
reference_id GLSA-201507-07
reference_type
scores
url https://security.gentoo.org/glsa/201507-07
28
reference_url https://access.redhat.com/errata/RHSA-2014:1826
reference_id RHSA-2014:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1826
29
reference_url https://usn.ubuntu.com/2365-1/
reference_id USN-2365-1
reference_type
scores
url https://usn.ubuntu.com/2365-1/
30
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2014-6052
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrnp-2yeq-y7ap
8
url VCID-p9tk-fn6b-cbbv
vulnerability_id VCID-p9tk-fn6b-cbbv
summary libvncserver: Multiple heap out-of-bound writes in VNC client code (Incomplete fix for CVE-2018-20019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20748.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20748.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20748
reference_id
reference_type
scores
0
value 0.10572
scoring_system epss
scoring_elements 0.93246
published_at 2026-04-01T12:55:00Z
1
value 0.10572
scoring_system epss
scoring_elements 0.93254
published_at 2026-04-02T12:55:00Z
2
value 0.10572
scoring_system epss
scoring_elements 0.93259
published_at 2026-04-04T12:55:00Z
3
value 0.10572
scoring_system epss
scoring_elements 0.93258
published_at 2026-04-07T12:55:00Z
4
value 0.10572
scoring_system epss
scoring_elements 0.93267
published_at 2026-04-08T12:55:00Z
5
value 0.10572
scoring_system epss
scoring_elements 0.93271
published_at 2026-04-09T12:55:00Z
6
value 0.10572
scoring_system epss
scoring_elements 0.93275
published_at 2026-04-13T12:55:00Z
7
value 0.10572
scoring_system epss
scoring_elements 0.93273
published_at 2026-04-12T12:55:00Z
8
value 0.10572
scoring_system epss
scoring_elements 0.93292
published_at 2026-04-16T12:55:00Z
9
value 0.10572
scoring_system epss
scoring_elements 0.93297
published_at 2026-04-18T12:55:00Z
10
value 0.10572
scoring_system epss
scoring_elements 0.93304
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20748
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671407
reference_id 1671407
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671407
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920941
reference_id 920941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920941
6
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
7
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
8
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.7%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20748
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9tk-fn6b-cbbv
9
url VCID-q89b-2emb-j3br
vulnerability_id VCID-q89b-2emb-j3br
summary
Multiple vulnerabilities have been found in ssvnc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20024
reference_id
reference_type
scores
0
value 0.03729
scoring_system epss
scoring_elements 0.87937
published_at 2026-04-01T12:55:00Z
1
value 0.03729
scoring_system epss
scoring_elements 0.87947
published_at 2026-04-02T12:55:00Z
2
value 0.03729
scoring_system epss
scoring_elements 0.8796
published_at 2026-04-04T12:55:00Z
3
value 0.03729
scoring_system epss
scoring_elements 0.87964
published_at 2026-04-07T12:55:00Z
4
value 0.03729
scoring_system epss
scoring_elements 0.87984
published_at 2026-04-08T12:55:00Z
5
value 0.03729
scoring_system epss
scoring_elements 0.87991
published_at 2026-04-09T12:55:00Z
6
value 0.03729
scoring_system epss
scoring_elements 0.88002
published_at 2026-04-11T12:55:00Z
7
value 0.03729
scoring_system epss
scoring_elements 0.87995
published_at 2026-04-12T12:55:00Z
8
value 0.03729
scoring_system epss
scoring_elements 0.87994
published_at 2026-04-13T12:55:00Z
9
value 0.03729
scoring_system epss
scoring_elements 0.88008
published_at 2026-04-16T12:55:00Z
10
value 0.03729
scoring_system epss
scoring_elements 0.88007
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20024
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661132
reference_id 1661132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661132
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
reference_id 916941
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
reference_id 945827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827
16
reference_url https://security.gentoo.org/glsa/201908-05
reference_id GLSA-201908-05
reference_type
scores
url https://security.gentoo.org/glsa/201908-05
17
reference_url https://security.gentoo.org/glsa/202006-06
reference_id GLSA-202006-06
reference_type
scores
url https://security.gentoo.org/glsa/202006-06
18
reference_url https://usn.ubuntu.com/3877-1/
reference_id USN-3877-1
reference_type
scores
url https://usn.ubuntu.com/3877-1/
19
reference_url https://usn.ubuntu.com/4547-1/
reference_id USN-4547-1
reference_type
scores
url https://usn.ubuntu.com/4547-1/
20
reference_url https://usn.ubuntu.com/4547-2/
reference_id USN-4547-2
reference_type
scores
url https://usn.ubuntu.com/4547-2/
21
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2018-20024
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q89b-2emb-j3br
10
url VCID-ug79-puqk-33ce
vulnerability_id VCID-ug79-puqk-33ce
summary
An integer overflow in TigerVNC might allow remote attackers to
    execute
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-0113.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0113.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6051
reference_id
reference_type
scores
0
value 0.06605
scoring_system epss
scoring_elements 0.912
published_at 2026-04-21T12:55:00Z
1
value 0.06605
scoring_system epss
scoring_elements 0.91123
published_at 2026-04-01T12:55:00Z
2
value 0.06605
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-02T12:55:00Z
3
value 0.06605
scoring_system epss
scoring_elements 0.91136
published_at 2026-04-04T12:55:00Z
4
value 0.06605
scoring_system epss
scoring_elements 0.91144
published_at 2026-04-07T12:55:00Z
5
value 0.06605
scoring_system epss
scoring_elements 0.91157
published_at 2026-04-08T12:55:00Z
6
value 0.06605
scoring_system epss
scoring_elements 0.91164
published_at 2026-04-09T12:55:00Z
7
value 0.06605
scoring_system epss
scoring_elements 0.91171
published_at 2026-04-11T12:55:00Z
8
value 0.06605
scoring_system epss
scoring_elements 0.91174
published_at 2026-04-12T12:55:00Z
9
value 0.06605
scoring_system epss
scoring_elements 0.91173
published_at 2026-04-13T12:55:00Z
10
value 0.06605
scoring_system epss
scoring_elements 0.91197
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6051
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
11
reference_url http://seclists.org/oss-sec/2014/q3/639
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q3/639
12
reference_url http://secunia.com/advisories/61506
reference_id
reference_type
scores
url http://secunia.com/advisories/61506
13
reference_url https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
reference_id
reference_type
scores
url https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
14
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
15
reference_url https://www.kde.org/info/security/advisory-20140923-1.txt
reference_id
reference_type
scores
url https://www.kde.org/info/security/advisory-20140923-1.txt
16
reference_url http://www.debian.org/security/2014/dsa-3081
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3081
17
reference_url http://www.ocert.org/advisories/ocert-2014-007.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2014-007.html
18
reference_url http://www.openwall.com/lists/oss-security/2014/09/25/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/25/11
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
20
reference_url http://www.securityfocus.com/bid/70093
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70093
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1144287
reference_id 1144287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1144287
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
reference_id 762745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6051
reference_id CVE-2014-6051
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-6051
31
reference_url https://security.gentoo.org/glsa/201507-07
reference_id GLSA-201507-07
reference_type
scores
url https://security.gentoo.org/glsa/201507-07
32
reference_url https://security.gentoo.org/glsa/201612-36
reference_id GLSA-201612-36
reference_type
scores
url https://security.gentoo.org/glsa/201612-36
33
reference_url https://access.redhat.com/errata/RHSA-2014:1826
reference_id RHSA-2014:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1826
34
reference_url https://access.redhat.com/errata/RHSA-2015:0113
reference_id RHSA-2015:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0113
35
reference_url https://usn.ubuntu.com/2365-1/
reference_id USN-2365-1
reference_type
scores
url https://usn.ubuntu.com/2365-1/
36
reference_url https://usn.ubuntu.com/4587-1/
reference_id USN-4587-1
reference_type
scores
url https://usn.ubuntu.com/4587-1/
fixed_packages
0
url pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2014-6051
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ug79-puqk-33ce
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie