Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/102883?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/102883?format=api", "purl": "pkg:rpm/redhat/libvncserver@0.9.11-17?arch=el8", "type": "rpm", "namespace": "redhat", "name": "libvncserver", "version": "0.9.11-17", "qualifiers": { "arch": "el8" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81317?format=api", "vulnerability_id": "VCID-7taj-t1kg-h3a9", "summary": "libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25708.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25708.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25708", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72395", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72297", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72306", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72303", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72293", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72321", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72348", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7231", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72337", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72265", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73713", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73778", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.7376", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73751", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00784", "scoring_system": "epss", "scoring_elements": "0.73703", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25708" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896739", "reference_id": "1896739", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1811", "reference_id": "RHSA-2021:1811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1811" }, { "reference_url": "https://usn.ubuntu.com/4636-1/", "reference_id": "USN-4636-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4636-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-25708" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7taj-t1kg-h3a9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74013?format=api", "vulnerability_id": "VCID-h8bk-uaqv-puap", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21247.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21247.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-21247", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.80914", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.80923", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.80945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.80942", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.8097", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.80977", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.80994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.8098", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.80972", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.8101", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81011", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81033", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81042", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81048", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81064", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81085", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81108", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81103", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81121", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01477", "scoring_system": "epss", "scoring_elements": "0.81162", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-21247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849886", "reference_id": "1849886", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1811", "reference_id": "RHSA-2021:1811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1811" } ], "fixed_packages": [], "aliases": [ "CVE-2018-21247" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h8bk-uaqv-puap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81159?format=api", "vulnerability_id": "VCID-qfyp-1xhm-13au", "summary": "libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14397.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14397.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14397", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.88996", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89004", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.8902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89022", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.8905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89064", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89063", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89059", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89077", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89084", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89087", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89095", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.8911", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89121", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89117", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89126", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04438", "scoring_system": "epss", "scoring_elements": "0.89143", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14397" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14397" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860344", "reference_id": "1860344", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1811", "reference_id": "RHSA-2021:1811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1811" }, { "reference_url": "https://usn.ubuntu.com/4434-1/", "reference_id": "USN-4434-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4434-1/" }, { "reference_url": "https://usn.ubuntu.com/4573-1/", "reference_id": "USN-4573-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4573-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14397" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qfyp-1xhm-13au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81152?format=api", "vulnerability_id": "VCID-sgkq-a36z-gyfp", "summary": "libvncserver: buffer overflow in ConnectClientToUnixSock()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20839.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-20839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88505", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.8853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88534", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88557", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88575", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88571", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88585", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88591", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88589", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88601", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88617", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.8863", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88627", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88639", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04081", "scoring_system": "epss", "scoring_elements": "0.88667", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-20839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20839" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849877", "reference_id": "1849877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1811", "reference_id": "RHSA-2021:1811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1811" }, { "reference_url": "https://usn.ubuntu.com/4434-1/", "reference_id": "USN-4434-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4434-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-20839" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sgkq-a36z-gyfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81155?format=api", "vulnerability_id": "VCID-wzpf-4nu7-xyc6", "summary": "libvncserver: libvncclient/rfbproto.c does not limit TextChat size", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14405.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80698", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80761", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80778", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80791", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80792", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80793", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80817", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80821", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80835", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80852", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80874", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80897", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80891", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80909", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80952", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14405" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860325", "reference_id": "1860325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1811", "reference_id": "RHSA-2021:1811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1811" }, { "reference_url": "https://usn.ubuntu.com/4434-1/", "reference_id": "USN-4434-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4434-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14405" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wzpf-4nu7-xyc6" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libvncserver@0.9.11-17%3Farch=el8" }