{"url":"http://public2.vulnerablecode.io/api/packages/101315?format=json","purl":"pkg:rpm/redhat/libwacom@1.6-2?arch=el8","type":"rpm","namespace":"redhat","name":"libwacom","version":"1.6-2","qualifiers":{"arch":"el8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32174?format=json","vulnerability_id":"VCID-1742-kcnn-pyg5","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46152","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46084","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142","reference_id":"1869142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[],"aliases":["CVE-2020-14361"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1742-kcnn-pyg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32170?format=json","vulnerability_id":"VCID-49m7-vqbk-s3ce","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29159","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241","reference_id":"1862241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"},{"reference_url":"https://usn.ubuntu.com/4490-1/","reference_id":"USN-4490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4490-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14345"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49m7-vqbk-s3ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32176?format=json","vulnerability_id":"VCID-hhnr-av5b-t7dc","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39028","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144","reference_id":"1869144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[],"aliases":["CVE-2020-14362"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhnr-av5b-t7dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32172?format=json","vulnerability_id":"VCID-n95v-qmcg-6bek","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18216","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18369","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258","reference_id":"1862258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986","reference_id":"968986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986"},{"reference_url":"https://security.archlinux.org/AVG-1211","reference_id":"AVG-1211","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1211"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[],"aliases":["CVE-2020-14347"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n95v-qmcg-6bek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32171?format=json","vulnerability_id":"VCID-pcn1-ehd2-g3f7","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38073","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37678","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246","reference_id":"1862246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[],"aliases":["CVE-2020-14346"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcn1-ehd2-g3f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32173?format=json","vulnerability_id":"VCID-psr2-gkpa-z7fj","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28417","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28343","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139","reference_id":"1869139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[],"aliases":["CVE-2020-14360"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psr2-gkpa-z7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59404?format=json","vulnerability_id":"VCID-tmju-y3w5-z3es","summary":"Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14363","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3548","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35143","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1872473","reference_id":"1872473","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1872473"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008","reference_id":"969008","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008"},{"reference_url":"https://security.gentoo.org/glsa/202008-18","reference_id":"GLSA-202008-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4908","reference_id":"RHSA-2020:4908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4946","reference_id":"RHSA-2020:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4487-1/","reference_id":"USN-4487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-1/"},{"reference_url":"https://usn.ubuntu.com/4487-2/","reference_id":"USN-4487-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-2/"}],"fixed_packages":[],"aliases":["CVE-2020-14363"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59403?format=json","vulnerability_id":"VCID-tsyg-kprr-67ck","summary":"Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14344","reference_id":"","reference_type":"","scores":[{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3701","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36796","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36765","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37087","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37029","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862255","reference_id":"1862255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862255"},{"reference_url":"https://security.archlinux.org/AVG-1212","reference_id":"AVG-1212","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1212"},{"reference_url":"https://security.gentoo.org/glsa/202008-18","reference_id":"GLSA-202008-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4487-1/","reference_id":"USN-4487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-1/"},{"reference_url":"https://usn.ubuntu.com/4487-2/","reference_id":"USN-4487-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-2/"}],"fixed_packages":[],"aliases":["CVE-2020-14344"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32177?format=json","vulnerability_id":"VCID-wq4p-h17p-fyf4","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33035","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276","reference_id":"1887276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[],"aliases":["CVE-2020-25712"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wq4p-h17p-fyf4"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libwacom@1.6-2%3Farch=el8"}