Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xorg-server@2:1.16.4-1
Typedeb
Namespacedebian
Namexorg-server
Version2:1.16.4-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:21.1.7-3+deb12u12
Latest_non_vulnerable_version2:21.1.22-1
Affected_by_vulnerabilities
0
url VCID-1742-kcnn-pyg5
vulnerability_id VCID-1742-kcnn-pyg5
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14361
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46091
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46131
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46151
published_at 2026-04-04T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46098
published_at 2026-04-07T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46154
published_at 2026-04-21T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46152
published_at 2026-04-09T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46175
published_at 2026-04-11T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46147
published_at 2026-04-12T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46156
published_at 2026-04-13T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46213
published_at 2026-04-16T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.4621
published_at 2026-04-18T12:55:00Z
11
value 0.00233
scoring_system epss
scoring_elements 0.46134
published_at 2026-04-24T12:55:00Z
12
value 0.00233
scoring_system epss
scoring_elements 0.46143
published_at 2026-04-26T12:55:00Z
13
value 0.00233
scoring_system epss
scoring_elements 0.46084
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869142
reference_id 1869142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869142
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
14
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2020-14361
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1742-kcnn-pyg5
1
url VCID-1cjg-y5qm-sffh
vulnerability_id VCID-1cjg-y5qm-sffh
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4008
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22403
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.2225
published_at 2026-04-29T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22421
published_at 2026-04-21T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22269
published_at 2026-04-24T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22255
published_at 2026-04-26T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.2257
published_at 2026-04-02T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-04T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.224
published_at 2026-04-07T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22481
published_at 2026-04-08T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22536
published_at 2026-04-09T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22555
published_at 2026-04-11T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22514
published_at 2026-04-12T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-13T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-16T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22471
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026059
reference_id 2026059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026059
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2021-4008
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjg-y5qm-sffh
2
url VCID-1pcv-f5h3-9fe9
vulnerability_id VCID-1pcv-f5h3-9fe9
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26595
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345257
reference_id 2345257
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345257
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26595
reference_id CVE-2025-26595
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/security/cve/CVE-2025-26595
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26595
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pcv-f5h3-9fe9
3
url VCID-1xa1-uf4t-z3bs
vulnerability_id VCID-1xa1-uf4t-z3bs
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12177
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.7645
published_at 2026-04-29T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76396
published_at 2026-04-21T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-24T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.76436
published_at 2026-04-26T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-16T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76411
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12177
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509218
reference_id 1509218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509218
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12177
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xa1-uf4t-z3bs
4
url VCID-28er-gwh3-rugq
vulnerability_id VCID-28er-gwh3-rugq
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.33954
published_at 2026-04-13T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33978
published_at 2026-04-12T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.3402
published_at 2026-04-11T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34021
published_at 2026-04-09T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.33989
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33947
published_at 2026-04-07T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.3409
published_at 2026-04-04T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-02T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.34833
published_at 2026-04-29T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35239
published_at 2026-04-16T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.35225
published_at 2026-04-18T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-21T12:55:00Z
12
value 0.00148
scoring_system epss
scoring_elements 0.34942
published_at 2026-04-24T12:55:00Z
13
value 0.00148
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
reference_id 2151757
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46342
reference_id CVE-2022-46342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://access.redhat.com/security/cve/CVE-2022-46342
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-46342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq
5
url VCID-2cp3-p3yx-17be
vulnerability_id VCID-2cp3-p3yx-17be
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49180
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.1778
published_at 2026-04-07T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17986
published_at 2026-04-02T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18079
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-08T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-09T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-11T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17899
published_at 2026-04-12T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.30915
published_at 2026-04-29T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31292
published_at 2026-04-21T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.3112
published_at 2026-04-24T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.30998
published_at 2026-04-26T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36105
published_at 2026-04-18T12:55:00Z
12
value 0.00154
scoring_system epss
scoring_elements 0.36079
published_at 2026-04-13T12:55:00Z
13
value 0.00154
scoring_system epss
scoring_elements 0.3612
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369981
reference_id 2369981
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369981
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6
reference_id 3c3a4b767b16174d3213055947ea7f4f88e10ec6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://access.redhat.com/security/cve/CVE-2025-49180
reference_id CVE-2025-49180
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/security/cve/CVE-2025-49180
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
60
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-49180
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cp3-p3yx-17be
6
url VCID-2vrb-n6cc-c7bc
vulnerability_id VCID-2vrb-n6cc-c7bc
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49178
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21634
published_at 2026-04-07T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21881
published_at 2026-04-04T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-12T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.2178
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21768
published_at 2026-04-09T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22897
published_at 2026-04-02T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.4076
published_at 2026-04-29T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.41013
published_at 2026-04-13T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.41056
published_at 2026-04-16T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.41027
published_at 2026-04-18T12:55:00Z
11
value 0.00191
scoring_system epss
scoring_elements 0.4095
published_at 2026-04-21T12:55:00Z
12
value 0.00191
scoring_system epss
scoring_elements 0.40857
published_at 2026-04-24T12:55:00Z
13
value 0.00191
scoring_system epss
scoring_elements 0.40844
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369977
reference_id 2369977
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369977
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://access.redhat.com/security/cve/CVE-2025-49178
reference_id CVE-2025-49178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/security/cve/CVE-2025-49178
30
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
reference_id d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://www.x.org/wiki/Development/Security/
60
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
61
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-49178
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vrb-n6cc-c7bc
7
url VCID-36vg-vekq-vbhj
vulnerability_id VCID-36vg-vekq-vbhj
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12183
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75277
published_at 2026-04-29T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75236
published_at 2026-04-16T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75242
published_at 2026-04-18T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75233
published_at 2026-04-21T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-24T12:55:00Z
5
value 0.00871
scoring_system epss
scoring_elements 0.75273
published_at 2026-04-26T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509224
reference_id 1509224
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509224
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12183
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36vg-vekq-vbhj
8
url VCID-37e1-pzxj-2fdt
vulnerability_id VCID-37e1-pzxj-2fdt
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26598
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06185
published_at 2026-04-09T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06135
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-16T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06165
published_at 2026-04-13T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06173
published_at 2026-04-12T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-07T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06148
published_at 2026-04-08T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06177
published_at 2026-04-11T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08866
published_at 2026-04-29T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09164
published_at 2026-04-21T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09153
published_at 2026-04-26T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09209
published_at 2026-04-24T12:55:00Z
12
value 0.00066
scoring_system epss
scoring_elements 0.20468
published_at 2026-04-02T12:55:00Z
13
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345254
reference_id 2345254
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345254
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26598
reference_id CVE-2025-26598
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/security/cve/CVE-2025-26598
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26598
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37e1-pzxj-2fdt
9
url VCID-3aj3-ufnq-13f3
vulnerability_id VCID-3aj3-ufnq-13f3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12184
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509225
reference_id 1509225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509225
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aj3-ufnq-13f3
10
url VCID-3q8e-92u3-sufy
vulnerability_id VCID-3q8e-92u3-sufy
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12179
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509220
reference_id 1509220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509220
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12179
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3q8e-92u3-sufy
11
url VCID-41cd-s77z-6bcc
vulnerability_id VCID-41cd-s77z-6bcc
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26596
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345256
reference_id 2345256
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345256
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26596
reference_id CVE-2025-26596
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/security/cve/CVE-2025-26596
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26596
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41cd-s77z-6bcc
12
url VCID-44yr-b94s-nfd5
vulnerability_id VCID-44yr-b94s-nfd5
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
reference_id
reference_type
scores
0
value 0.0113
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-02T12:55:00Z
1
value 0.0113
scoring_system epss
scoring_elements 0.78293
published_at 2026-04-04T12:55:00Z
2
value 0.0113
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-07T12:55:00Z
3
value 0.0113
scoring_system epss
scoring_elements 0.78301
published_at 2026-04-08T12:55:00Z
4
value 0.0113
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-09T12:55:00Z
5
value 0.0113
scoring_system epss
scoring_elements 0.78333
published_at 2026-04-11T12:55:00Z
6
value 0.0113
scoring_system epss
scoring_elements 0.78316
published_at 2026-04-12T12:55:00Z
7
value 0.0113
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-13T12:55:00Z
8
value 0.01202
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-29T12:55:00Z
9
value 0.01202
scoring_system epss
scoring_elements 0.78955
published_at 2026-04-16T12:55:00Z
10
value 0.01202
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-18T12:55:00Z
11
value 0.01202
scoring_system epss
scoring_elements 0.78951
published_at 2026-04-21T12:55:00Z
12
value 0.01202
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-24T12:55:00Z
13
value 0.01202
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
reference_id 2151755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-46340
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5
13
url VCID-49m7-vqbk-s3ce
vulnerability_id VCID-49m7-vqbk-s3ce
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14345
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29563
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.2963
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.2968
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29501
published_at 2026-04-07T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29601
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29603
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29558
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29505
published_at 2026-04-13T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29524
published_at 2026-04-16T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29497
published_at 2026-04-18T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29451
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29338
published_at 2026-04-24T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29224
published_at 2026-04-26T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29159
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862241
reference_id 1862241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862241
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
14
reference_url https://usn.ubuntu.com/4490-1/
reference_id USN-4490-1
reference_type
scores
url https://usn.ubuntu.com/4490-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2020-14345
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49m7-vqbk-s3ce
14
url VCID-4ngr-6ccu-r7fv
vulnerability_id VCID-4ngr-6ccu-r7fv
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-29T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-24T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.2612
published_at 2026-04-26T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.28048
published_at 2026-04-02T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.28089
published_at 2026-04-04T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27884
published_at 2026-04-18T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27951
published_at 2026-04-08T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27992
published_at 2026-04-09T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27995
published_at 2026-04-11T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27952
published_at 2026-04-12T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27893
published_at 2026-04-13T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27902
published_at 2026-04-16T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27841
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
reference_id 2272000
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31083
reference_id CVE-2024-31083
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/security/cve/CVE-2024-31083
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-31083
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ngr-6ccu-r7fv
15
url VCID-515f-a8yj-4fej
vulnerability_id VCID-515f-a8yj-4fej
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26600
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345252
reference_id 2345252
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345252
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26600
reference_id CVE-2025-26600
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/security/cve/CVE-2025-26600
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26600
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-515f-a8yj-4fej
16
url VCID-5awx-j7z7-qyak
vulnerability_id VCID-5awx-j7z7-qyak
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0408
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04337
published_at 2026-04-29T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04147
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04271
published_at 2026-04-21T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04284
published_at 2026-04-24T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04304
published_at 2026-04-26T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04874
published_at 2026-04-07T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04831
published_at 2026-04-02T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04857
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06491
published_at 2026-04-11T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06484
published_at 2026-04-12T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06473
published_at 2026-04-13T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-16T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-08T12:55:00Z
13
value 0.00024
scoring_system epss
scoring_elements 0.06496
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257689
reference_id 2257689
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257689
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0408
reference_id CVE-2024-0408
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/security/cve/CVE-2024-0408
23
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
24
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:0320
25
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2169
26
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2170
27
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2995
28
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2996
29
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
30
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
31
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-0408
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5awx-j7z7-qyak
17
url VCID-62fw-zp51-gyhw
vulnerability_id VCID-62fw-zp51-gyhw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10971
reference_id
reference_type
scores
0
value 0.02611
scoring_system epss
scoring_elements 0.85568
published_at 2026-04-01T12:55:00Z
1
value 0.02611
scoring_system epss
scoring_elements 0.8558
published_at 2026-04-02T12:55:00Z
2
value 0.02611
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-04T12:55:00Z
3
value 0.02611
scoring_system epss
scoring_elements 0.85603
published_at 2026-04-07T12:55:00Z
4
value 0.02611
scoring_system epss
scoring_elements 0.85623
published_at 2026-04-08T12:55:00Z
5
value 0.02611
scoring_system epss
scoring_elements 0.85634
published_at 2026-04-09T12:55:00Z
6
value 0.02611
scoring_system epss
scoring_elements 0.85649
published_at 2026-04-11T12:55:00Z
7
value 0.02611
scoring_system epss
scoring_elements 0.85646
published_at 2026-04-12T12:55:00Z
8
value 0.02611
scoring_system epss
scoring_elements 0.85642
published_at 2026-04-13T12:55:00Z
9
value 0.02611
scoring_system epss
scoring_elements 0.85664
published_at 2026-04-16T12:55:00Z
10
value 0.02611
scoring_system epss
scoring_elements 0.8567
published_at 2026-04-18T12:55:00Z
11
value 0.02611
scoring_system epss
scoring_elements 0.85665
published_at 2026-04-21T12:55:00Z
12
value 0.02611
scoring_system epss
scoring_elements 0.85687
published_at 2026-04-24T12:55:00Z
13
value 0.02611
scoring_system epss
scoring_elements 0.85698
published_at 2026-04-26T12:55:00Z
14
value 0.02611
scoring_system epss
scoring_elements 0.857
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10971
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473204
reference_id 1473204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
reference_id 867492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
6
reference_url https://security.archlinux.org/ASA-201708-11
reference_id ASA-201708-11
reference_type
scores
url https://security.archlinux.org/ASA-201708-11
7
reference_url https://security.archlinux.org/AVG-341
reference_id AVG-341
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-341
8
reference_url https://usn.ubuntu.com/3362-1/
reference_id USN-3362-1
reference_type
scores
url https://usn.ubuntu.com/3362-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-10971
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62fw-zp51-gyhw
18
url VCID-68t6-6w3n-jffa
vulnerability_id VCID-68t6-6w3n-jffa
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5380
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22401
published_at 2026-04-29T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22568
published_at 2026-04-21T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22413
published_at 2026-04-24T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22403
published_at 2026-04-26T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.2393
published_at 2026-04-07T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24043
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.2406
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24018
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.23961
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.2396
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.23996
published_at 2026-04-08T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.24111
published_at 2026-04-02T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.24149
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244736
reference_id 2244736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2244736
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7428
reference_id RHSA-2023:7428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7428
8
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
9
reference_url https://access.redhat.com/errata/RHSA-2024:2298
reference_id RHSA-2024:2298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2298
10
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
11
reference_url https://access.redhat.com/errata/RHSA-2024:3067
reference_id RHSA-2024:3067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3067
12
reference_url https://usn.ubuntu.com/6453-1/
reference_id USN-6453-1
reference_type
scores
url https://usn.ubuntu.com/6453-1/
13
reference_url https://usn.ubuntu.com/6453-2/
reference_id USN-6453-2
reference_type
scores
url https://usn.ubuntu.com/6453-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2023-5380
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68t6-6w3n-jffa
19
url VCID-6hwh-7tvr-sqgn
vulnerability_id VCID-6hwh-7tvr-sqgn
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26597
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345255
reference_id 2345255
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345255
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26597
reference_id CVE-2025-26597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/security/cve/CVE-2025-26597
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26597
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hwh-7tvr-sqgn
20
url VCID-6qsh-kaxk-zuf9
vulnerability_id VCID-6qsh-kaxk-zuf9
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4011
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12368
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12243
published_at 2026-04-29T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-21T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12387
published_at 2026-04-24T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12354
published_at 2026-04-26T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12476
published_at 2026-04-02T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-04T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12324
published_at 2026-04-07T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12404
published_at 2026-04-08T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12455
published_at 2026-04-09T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.1246
published_at 2026-04-11T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12422
published_at 2026-04-12T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12381
published_at 2026-04-13T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12282
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026074
reference_id 2026074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026074
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2021-4011
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qsh-kaxk-zuf9
21
url VCID-6rcq-qxef-nuf7
vulnerability_id VCID-6rcq-qxef-nuf7
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52783
published_at 2026-04-29T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52842
published_at 2026-04-21T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5281
published_at 2026-04-24T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52821
published_at 2026-04-26T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
11
value 0.00321
scoring_system epss
scoring_elements 0.55161
published_at 2026-04-18T12:55:00Z
12
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
reference_id 2256690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-0229
reference_id CVE-2024-0229
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/security/cve/CVE-2024-0229
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-0229
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcq-qxef-nuf7
22
url VCID-7nax-5yw9-eye8
vulnerability_id VCID-7nax-5yw9-eye8
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26599
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345253
reference_id 2345253
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345253
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26599
reference_id CVE-2025-26599
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/security/cve/CVE-2025-26599
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26599
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nax-5yw9-eye8
23
url VCID-7r23-ad57-yydp
vulnerability_id VCID-7r23-ad57-yydp
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13721
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24792
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24582
published_at 2026-04-29T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24727
published_at 2026-04-16T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24719
published_at 2026-04-18T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24696
published_at 2026-04-21T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24636
published_at 2026-04-24T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24625
published_at 2026-04-26T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24868
published_at 2026-04-02T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24907
published_at 2026-04-04T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.2468
published_at 2026-04-07T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24749
published_at 2026-04-08T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24795
published_at 2026-04-09T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24808
published_at 2026-04-11T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24768
published_at 2026-04-12T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24711
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13721
2
reference_url https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
reference_id
reference_type
scores
url https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:C
1
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
reference_id
reference_type
scores
url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
19
reference_url http://www.debian.org/security/2017/dsa-4000
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-4000
20
reference_url http://www.openwall.com/lists/oss-security/2017/10/04/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/10/04/10
21
reference_url http://www.securityfocus.com/bid/101238
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101238
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500387
reference_id 1500387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500387
23
reference_url https://security.archlinux.org/ASA-201710-10
reference_id ASA-201710-10
reference_type
scores
url https://security.archlinux.org/ASA-201710-10
24
reference_url https://security.archlinux.org/AVG-432
reference_id AVG-432
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-432
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13721
reference_id CVE-2017-13721
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13721
29
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
30
reference_url https://usn.ubuntu.com/3453-1/
reference_id USN-3453-1
reference_type
scores
url https://usn.ubuntu.com/3453-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-13721
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7r23-ad57-yydp
24
url VCID-954x-c1x3-67gg
vulnerability_id VCID-954x-c1x3-67gg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10972
reference_id
reference_type
scores
0
value 0.0056
scoring_system epss
scoring_elements 0.68192
published_at 2026-04-01T12:55:00Z
1
value 0.0056
scoring_system epss
scoring_elements 0.68213
published_at 2026-04-02T12:55:00Z
2
value 0.0056
scoring_system epss
scoring_elements 0.68231
published_at 2026-04-04T12:55:00Z
3
value 0.0056
scoring_system epss
scoring_elements 0.68207
published_at 2026-04-07T12:55:00Z
4
value 0.0056
scoring_system epss
scoring_elements 0.68258
published_at 2026-04-08T12:55:00Z
5
value 0.0056
scoring_system epss
scoring_elements 0.68274
published_at 2026-04-09T12:55:00Z
6
value 0.0056
scoring_system epss
scoring_elements 0.68299
published_at 2026-04-11T12:55:00Z
7
value 0.0056
scoring_system epss
scoring_elements 0.68286
published_at 2026-04-12T12:55:00Z
8
value 0.0056
scoring_system epss
scoring_elements 0.68253
published_at 2026-04-13T12:55:00Z
9
value 0.0056
scoring_system epss
scoring_elements 0.68292
published_at 2026-04-16T12:55:00Z
10
value 0.0056
scoring_system epss
scoring_elements 0.68303
published_at 2026-04-18T12:55:00Z
11
value 0.0056
scoring_system epss
scoring_elements 0.68283
published_at 2026-04-21T12:55:00Z
12
value 0.0056
scoring_system epss
scoring_elements 0.68326
published_at 2026-04-24T12:55:00Z
13
value 0.0056
scoring_system epss
scoring_elements 0.68335
published_at 2026-04-26T12:55:00Z
14
value 0.0056
scoring_system epss
scoring_elements 0.6834
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10972
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473205
reference_id 1473205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473205
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
reference_id 867492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
6
reference_url https://security.archlinux.org/ASA-201708-11
reference_id ASA-201708-11
reference_type
scores
url https://security.archlinux.org/ASA-201708-11
7
reference_url https://security.archlinux.org/AVG-341
reference_id AVG-341
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-341
8
reference_url https://usn.ubuntu.com/3362-1/
reference_id USN-3362-1
reference_type
scores
url https://usn.ubuntu.com/3362-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-10972
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-954x-c1x3-67gg
25
url VCID-9cjy-6fj5-r7ag
vulnerability_id VCID-9cjy-6fj5-r7ag
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
reference_id 2271998
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31081
reference_id CVE-2024-31081
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/security/cve/CVE-2024-31081
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-31081
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cjy-6fj5-r7ag
26
url VCID-a4bk-m98g-93f8
vulnerability_id VCID-a4bk-m98g-93f8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
reference_id
reference_type
scores
0
value 0.00908
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-02T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75742
published_at 2026-04-04T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-07T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-13T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75772
published_at 2026-04-12T12:55:00Z
7
value 0.00966
scoring_system epss
scoring_elements 0.76661
published_at 2026-04-29T12:55:00Z
8
value 0.00966
scoring_system epss
scoring_elements 0.76618
published_at 2026-04-16T12:55:00Z
9
value 0.00966
scoring_system epss
scoring_elements 0.76622
published_at 2026-04-18T12:55:00Z
10
value 0.00966
scoring_system epss
scoring_elements 0.7661
published_at 2026-04-21T12:55:00Z
11
value 0.00966
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-24T12:55:00Z
12
value 0.00966
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
reference_id 2151760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-46344
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8
27
url VCID-bv8h-xa48-hbh7
vulnerability_id VCID-bv8h-xa48-hbh7
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2319
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10182
published_at 2026-04-29T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10249
published_at 2026-04-24T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10237
published_at 2026-04-26T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10222
published_at 2026-04-02T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10287
published_at 2026-04-04T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10183
published_at 2026-04-07T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10257
published_at 2026-04-08T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10319
published_at 2026-04-09T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10349
published_at 2026-04-11T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10308
published_at 2026-04-12T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10289
published_at 2026-04-13T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10164
published_at 2026-04-16T12:55:00Z
12
value 0.00035
scoring_system epss
scoring_elements 0.10138
published_at 2026-04-18T12:55:00Z
13
value 0.00035
scoring_system epss
scoring_elements 0.10269
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2319
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
reference_id 1014903
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106671
reference_id 2106671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106671
7
reference_url https://security.archlinux.org/AVG-2770
reference_id AVG-2770
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2770
8
reference_url https://security.gentoo.org/glsa/202210-30
reference_id GLSA-202210-30
reference_type
scores
url https://security.gentoo.org/glsa/202210-30
9
reference_url https://access.redhat.com/errata/RHSA-2022:5905
reference_id RHSA-2022:5905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5905
10
reference_url https://access.redhat.com/errata/RHSA-2022:7583
reference_id RHSA-2022:7583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7583
11
reference_url https://access.redhat.com/errata/RHSA-2022:8221
reference_id RHSA-2022:8221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8221
12
reference_url https://access.redhat.com/errata/RHSA-2022:8222
reference_id RHSA-2022:8222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8222
13
reference_url https://usn.ubuntu.com/5510-1/
reference_id USN-5510-1
reference_type
scores
url https://usn.ubuntu.com/5510-1/
14
reference_url https://usn.ubuntu.com/5510-2/
reference_id USN-5510-2
reference_type
scores
url https://usn.ubuntu.com/5510-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-2319
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv8h-xa48-hbh7
28
url VCID-bvay-s9w4-muf8
vulnerability_id VCID-bvay-s9w4-muf8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3551
reference_id
reference_type
scores
0
value 0.00749
scoring_system epss
scoring_elements 0.73079
published_at 2026-04-02T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.73099
published_at 2026-04-04T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73073
published_at 2026-04-07T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.73109
published_at 2026-04-08T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73123
published_at 2026-04-09T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73148
published_at 2026-04-11T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73127
published_at 2026-04-12T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73121
published_at 2026-04-13T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73164
published_at 2026-04-16T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.73174
published_at 2026-04-18T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73165
published_at 2026-04-21T12:55:00Z
11
value 0.00749
scoring_system epss
scoring_elements 0.73201
published_at 2026-04-24T12:55:00Z
12
value 0.00749
scoring_system epss
scoring_elements 0.73214
published_at 2026-04-26T12:55:00Z
13
value 0.00749
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140701
reference_id 2140701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140701
6
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
7
reference_url https://access.redhat.com/errata/RHSA-2022:8491
reference_id RHSA-2022:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8491
8
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
9
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
10
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
11
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
12
reference_url https://usn.ubuntu.com/5740-1/
reference_id USN-5740-1
reference_type
scores
url https://usn.ubuntu.com/5740-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-3551
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bvay-s9w4-muf8
29
url VCID-c81n-kx59-q7h5
vulnerability_id VCID-c81n-kx59-q7h5
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12180
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75277
published_at 2026-04-29T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75236
published_at 2026-04-16T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75242
published_at 2026-04-18T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75233
published_at 2026-04-21T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-24T12:55:00Z
5
value 0.00871
scoring_system epss
scoring_elements 0.75273
published_at 2026-04-26T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509221
reference_id 1509221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509221
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12180
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c81n-kx59-q7h5
30
url VCID-cfjq-38mk-hbhf
vulnerability_id VCID-cfjq-38mk-hbhf
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12181
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509222
reference_id 1509222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509222
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12181
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfjq-38mk-hbhf
31
url VCID-dcdh-w9a1-wfff
vulnerability_id VCID-dcdh-w9a1-wfff
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12185
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509215
reference_id 1509215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509215
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcdh-w9a1-wfff
32
url VCID-e7w3-3hpm-hbec
vulnerability_id VCID-e7w3-3hpm-hbec
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-12T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39146
published_at 2026-04-11T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39135
published_at 2026-04-09T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-08T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-04T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39063
published_at 2026-04-07T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39121
published_at 2026-04-02T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-13T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40281
published_at 2026-04-29T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-18T12:55:00Z
11
value 0.00187
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-21T12:55:00Z
12
value 0.00187
scoring_system epss
scoring_elements 0.40375
published_at 2026-04-24T12:55:00Z
13
value 0.00187
scoring_system epss
scoring_elements 0.40362
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
reference_id 2151761
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-4283
reference_id CVE-2022-4283
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://access.redhat.com/security/cve/CVE-2022-4283
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-4283
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec
33
url VCID-e9px-edn1-tufs
vulnerability_id VCID-e9px-edn1-tufs
summary xorg: xmayland: Use-after-free in XPresentNotify structure creation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62229
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01124
published_at 2026-04-08T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01109
published_at 2026-04-02T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01112
published_at 2026-04-04T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-07T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01589
published_at 2026-04-21T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02758
published_at 2026-04-29T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02664
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.0264
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02626
published_at 2026-04-12T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02624
published_at 2026-04-13T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02607
published_at 2026-04-16T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02615
published_at 2026-04-18T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02703
published_at 2026-04-26T12:55:00Z
13
value 0.00014
scoring_system epss
scoring_elements 0.02716
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402649
reference_id 2402649
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402649
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62229
reference_id CVE-2025-62229
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/security/cve/CVE-2025-62229
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-62229
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9px-edn1-tufs
34
url VCID-ebqr-xztt-y3bj
vulnerability_id VCID-ebqr-xztt-y3bj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12187
reference_id
reference_type
scores
0
value 0.00773
scoring_system epss
scoring_elements 0.73526
published_at 2026-04-01T12:55:00Z
1
value 0.00773
scoring_system epss
scoring_elements 0.73661
published_at 2026-04-29T12:55:00Z
2
value 0.00773
scoring_system epss
scoring_elements 0.73653
published_at 2026-04-24T12:55:00Z
3
value 0.00773
scoring_system epss
scoring_elements 0.73662
published_at 2026-04-26T12:55:00Z
4
value 0.00773
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-02T12:55:00Z
5
value 0.00773
scoring_system epss
scoring_elements 0.73557
published_at 2026-04-04T12:55:00Z
6
value 0.00773
scoring_system epss
scoring_elements 0.73529
published_at 2026-04-07T12:55:00Z
7
value 0.00773
scoring_system epss
scoring_elements 0.73565
published_at 2026-04-08T12:55:00Z
8
value 0.00773
scoring_system epss
scoring_elements 0.73578
published_at 2026-04-09T12:55:00Z
9
value 0.00773
scoring_system epss
scoring_elements 0.73601
published_at 2026-04-11T12:55:00Z
10
value 0.00773
scoring_system epss
scoring_elements 0.73583
published_at 2026-04-12T12:55:00Z
11
value 0.00773
scoring_system epss
scoring_elements 0.73575
published_at 2026-04-13T12:55:00Z
12
value 0.00773
scoring_system epss
scoring_elements 0.73619
published_at 2026-04-16T12:55:00Z
13
value 0.00773
scoring_system epss
scoring_elements 0.73628
published_at 2026-04-18T12:55:00Z
14
value 0.00773
scoring_system epss
scoring_elements 0.7362
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509217
reference_id 1509217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509217
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12187
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebqr-xztt-y3bj
35
url VCID-em7x-adw1-tyaz
vulnerability_id VCID-em7x-adw1-tyaz
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2320
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18318
published_at 2026-04-29T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18374
published_at 2026-04-24T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18358
published_at 2026-04-26T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18692
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18747
published_at 2026-04-04T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18463
published_at 2026-04-07T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18543
published_at 2026-04-08T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18596
published_at 2026-04-09T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18599
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18552
published_at 2026-04-12T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18499
published_at 2026-04-13T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18441
published_at 2026-04-16T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.1845
published_at 2026-04-18T12:55:00Z
13
value 0.00059
scoring_system epss
scoring_elements 0.18471
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2320
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
reference_id 1014903
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106683
reference_id 2106683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106683
7
reference_url https://security.archlinux.org/AVG-2770
reference_id AVG-2770
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2770
8
reference_url https://security.gentoo.org/glsa/202210-30
reference_id GLSA-202210-30
reference_type
scores
url https://security.gentoo.org/glsa/202210-30
9
reference_url https://access.redhat.com/errata/RHSA-2022:5905
reference_id RHSA-2022:5905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5905
10
reference_url https://access.redhat.com/errata/RHSA-2022:7583
reference_id RHSA-2022:7583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7583
11
reference_url https://access.redhat.com/errata/RHSA-2022:8221
reference_id RHSA-2022:8221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8221
12
reference_url https://access.redhat.com/errata/RHSA-2022:8222
reference_id RHSA-2022:8222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8222
13
reference_url https://usn.ubuntu.com/5510-1/
reference_id USN-5510-1
reference_type
scores
url https://usn.ubuntu.com/5510-1/
14
reference_url https://usn.ubuntu.com/5510-2/
reference_id USN-5510-2
reference_type
scores
url https://usn.ubuntu.com/5510-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-2320
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-em7x-adw1-tyaz
36
url VCID-fcac-qzvs-rfa8
vulnerability_id VCID-fcac-qzvs-rfa8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4010
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23318
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23145
published_at 2026-04-29T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23355
published_at 2026-04-21T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23164
published_at 2026-04-24T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23154
published_at 2026-04-26T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23492
published_at 2026-04-02T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23528
published_at 2026-04-04T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23312
published_at 2026-04-07T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23384
published_at 2026-04-08T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23435
published_at 2026-04-09T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23455
published_at 2026-04-11T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23417
published_at 2026-04-12T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-13T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.2338
published_at 2026-04-16T12:55:00Z
14
value 0.00079
scoring_system epss
scoring_elements 0.23375
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026073
reference_id 2026073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026073
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2021-4010
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fcac-qzvs-rfa8
37
url VCID-fgnr-h7rm-83d4
vulnerability_id VCID-fgnr-h7rm-83d4
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0409
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-29T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03005
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-21T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03124
published_at 2026-04-24T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03114
published_at 2026-04-26T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04803
published_at 2026-04-04T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04858
published_at 2026-04-08T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-09T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04852
published_at 2026-04-11T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04829
published_at 2026-04-12T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04809
published_at 2026-04-13T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04757
published_at 2026-04-16T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.0478
published_at 2026-04-02T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.0482
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257690
reference_id 2257690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0409
reference_id CVE-2024-0409
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/security/cve/CVE-2024-0409
23
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
24
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:0320
25
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2169
26
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2170
27
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2995
28
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2996
29
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
30
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-0409
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgnr-h7rm-83d4
38
url VCID-fpny-yp5d-zbcu
vulnerability_id VCID-fpny-yp5d-zbcu
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12182
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.7645
published_at 2026-04-29T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-24T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.76436
published_at 2026-04-26T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-16T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76411
published_at 2026-04-18T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76396
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509223
reference_id 1509223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509223
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12182
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpny-yp5d-zbcu
39
url VCID-h242-94ba-ykcb
vulnerability_id VCID-h242-94ba-ykcb
summary
Multiple vulnerabilities have been found in X.Org X Server, the
    worst of which may allow authenticated attackers to read from or send
    information to arbitrary X11 clients.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3164
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20212
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.2036
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20421
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20146
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20227
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20286
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20313
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20267
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20209
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20201
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20205
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20203
published_at 2026-04-21T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.20082
published_at 2026-04-24T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.20077
published_at 2026-04-26T12:55:00Z
14
value 0.00065
scoring_system epss
scoring_elements 0.20046
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3164
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1219548
reference_id 1219548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1219548
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410
reference_id 788410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410
5
reference_url https://security.gentoo.org/glsa/201701-64
reference_id GLSA-201701-64
reference_type
scores
url https://security.gentoo.org/glsa/201701-64
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
aliases CVE-2015-3164
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h242-94ba-ykcb
40
url VCID-hhnr-av5b-t7dc
vulnerability_id VCID-hhnr-av5b-t7dc
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14362
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39256
published_at 2026-04-01T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39447
published_at 2026-04-04T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39361
published_at 2026-04-07T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39416
published_at 2026-04-08T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39432
published_at 2026-04-09T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39443
published_at 2026-04-11T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39405
published_at 2026-04-12T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-13T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39438
published_at 2026-04-16T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.3941
published_at 2026-04-18T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39323
published_at 2026-04-21T12:55:00Z
12
value 0.00178
scoring_system epss
scoring_elements 0.39127
published_at 2026-04-24T12:55:00Z
13
value 0.00178
scoring_system epss
scoring_elements 0.39108
published_at 2026-04-26T12:55:00Z
14
value 0.00178
scoring_system epss
scoring_elements 0.39028
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869144
reference_id 1869144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869144
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
14
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2020-14362
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhnr-av5b-t7dc
41
url VCID-hkrr-v71f-xqdb
vulnerability_id VCID-hkrr-v71f-xqdb
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26601
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345251
reference_id 2345251
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345251
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26601
reference_id CVE-2025-26601
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/security/cve/CVE-2025-26601
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26601
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkrr-v71f-xqdb
42
url VCID-hzj2-b4e4-ubf6
vulnerability_id VCID-hzj2-b4e4-ubf6
summary
A vulnerability in X.Org X Server may allow users to escalate
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3472
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26016
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.2577
published_at 2026-04-29T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25888
published_at 2026-04-21T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25823
published_at 2026-04-24T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-26T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.261
published_at 2026-04-02T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26139
published_at 2026-04-04T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.25905
published_at 2026-04-07T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.25973
published_at 2026-04-08T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26025
published_at 2026-04-09T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26035
published_at 2026-04-11T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.2599
published_at 2026-04-12T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25931
published_at 2026-04-13T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25936
published_at 2026-04-16T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3472
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944167
reference_id 1944167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944167
5
reference_url https://security.archlinux.org/AVG-1811
reference_id AVG-1811
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1811
6
reference_url https://security.archlinux.org/AVG-1812
reference_id AVG-1812
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1812
7
reference_url https://security.gentoo.org/glsa/202104-02
reference_id GLSA-202104-02
reference_type
scores
url https://security.gentoo.org/glsa/202104-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2033
reference_id RHSA-2021:2033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2033
9
reference_url https://usn.ubuntu.com/4905-1/
reference_id USN-4905-1
reference_type
scores
url https://usn.ubuntu.com/4905-1/
10
reference_url https://usn.ubuntu.com/4905-2/
reference_id USN-4905-2
reference_type
scores
url https://usn.ubuntu.com/4905-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2021-3472
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hzj2-b4e4-ubf6
43
url VCID-j6qd-r6ua-cfbm
vulnerability_id VCID-j6qd-r6ua-cfbm
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
reference_id 2256542
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21886
reference_id CVE-2024-21886
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/security/cve/CVE-2024-21886
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-21886
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6qd-r6ua-cfbm
44
url VCID-jrx7-pbf3-h3at
vulnerability_id VCID-jrx7-pbf3-h3at
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
9
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
reference_id 2151756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46341
reference_id CVE-2022-46341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://access.redhat.com/security/cve/CVE-2022-46341
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-46341
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at
45
url VCID-juet-bb4m-hkhq
vulnerability_id VCID-juet-bb4m-hkhq
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17648
published_at 2026-04-29T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-21T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17716
published_at 2026-04-24T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17692
published_at 2026-04-26T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17991
published_at 2026-04-02T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18045
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17745
published_at 2026-04-07T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17833
published_at 2026-04-08T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17895
published_at 2026-04-09T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.1791
published_at 2026-04-11T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17866
published_at 2026-04-12T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17817
published_at 2026-04-13T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-16T12:55:00Z
13
value 0.00057
scoring_system epss
scoring_elements 0.17769
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
reference_id 1086244
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
reference_id 1086245
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
reference_id 2317233
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2024-9632
reference_id CVE-2024-9632
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/security/cve/CVE-2024-9632
28
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
29
reference_url https://access.redhat.com/errata/RHSA-2024:10090
reference_id RHSA-2024:10090
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:10090
30
reference_url https://access.redhat.com/errata/RHSA-2024:8798
reference_id RHSA-2024:8798
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:8798
31
reference_url https://access.redhat.com/errata/RHSA-2024:9540
reference_id RHSA-2024:9540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9540
32
reference_url https://access.redhat.com/errata/RHSA-2024:9579
reference_id RHSA-2024:9579
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9579
33
reference_url https://access.redhat.com/errata/RHSA-2024:9601
reference_id RHSA-2024:9601
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9601
34
reference_url https://access.redhat.com/errata/RHSA-2024:9690
reference_id RHSA-2024:9690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9690
35
reference_url https://access.redhat.com/errata/RHSA-2024:9816
reference_id RHSA-2024:9816
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9816
36
reference_url https://access.redhat.com/errata/RHSA-2024:9818
reference_id RHSA-2024:9818
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9818
37
reference_url https://access.redhat.com/errata/RHSA-2024:9819
reference_id RHSA-2024:9819
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9819
38
reference_url https://access.redhat.com/errata/RHSA-2024:9820
reference_id RHSA-2024:9820
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9820
39
reference_url https://access.redhat.com/errata/RHSA-2024:9901
reference_id RHSA-2024:9901
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9901
40
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:12751
41
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7163
42
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7165
43
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7458
44
reference_url https://usn.ubuntu.com/7085-1/
reference_id USN-7085-1
reference_type
scores
url https://usn.ubuntu.com/7085-1/
45
reference_url https://usn.ubuntu.com/7085-2/
reference_id USN-7085-2
reference_type
scores
url https://usn.ubuntu.com/7085-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2024-9632
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juet-bb4m-hkhq
46
url VCID-jvgv-d94j-mqa1
vulnerability_id VCID-jvgv-d94j-mqa1
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12178
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75277
published_at 2026-04-29T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75236
published_at 2026-04-16T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75242
published_at 2026-04-18T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75233
published_at 2026-04-21T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-24T12:55:00Z
5
value 0.00871
scoring_system epss
scoring_elements 0.75273
published_at 2026-04-26T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509219
reference_id 1509219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509219
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12178
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvgv-d94j-mqa1
47
url VCID-m2hp-k4c4-m3db
vulnerability_id VCID-m2hp-k4c4-m3db
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3550
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61403
published_at 2026-04-02T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-04T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-07T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61448
published_at 2026-04-08T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61464
published_at 2026-04-09T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61485
published_at 2026-04-11T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61471
published_at 2026-04-12T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61453
published_at 2026-04-13T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-16T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61496
published_at 2026-04-18T12:55:00Z
10
value 0.00412
scoring_system epss
scoring_elements 0.6148
published_at 2026-04-21T12:55:00Z
11
value 0.00412
scoring_system epss
scoring_elements 0.61467
published_at 2026-04-24T12:55:00Z
12
value 0.00412
scoring_system epss
scoring_elements 0.61484
published_at 2026-04-26T12:55:00Z
13
value 0.00412
scoring_system epss
scoring_elements 0.61479
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140698
reference_id 2140698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140698
6
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
7
reference_url https://access.redhat.com/errata/RHSA-2022:8491
reference_id RHSA-2022:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8491
8
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
9
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
10
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
11
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
12
reference_url https://usn.ubuntu.com/5740-1/
reference_id USN-5740-1
reference_type
scores
url https://usn.ubuntu.com/5740-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-3550
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2hp-k4c4-m3db
48
url VCID-n95v-qmcg-6bek
vulnerability_id VCID-n95v-qmcg-6bek
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14347
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.1844
published_at 2026-04-01T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18216
published_at 2026-04-29T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18269
published_at 2026-04-24T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18255
published_at 2026-04-26T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18585
published_at 2026-04-02T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.1864
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18349
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18432
published_at 2026-04-08T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18484
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18437
published_at 2026-04-12T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18386
published_at 2026-04-13T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18329
published_at 2026-04-16T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18343
published_at 2026-04-18T12:55:00Z
13
value 0.00059
scoring_system epss
scoring_elements 0.18369
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14347
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862258
reference_id 1862258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862258
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986
reference_id 968986
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986
10
reference_url https://security.archlinux.org/AVG-1211
reference_id AVG-1211
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1211
11
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
12
reference_url https://access.redhat.com/errata/RHSA-2020:5408
reference_id RHSA-2020:5408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5408
13
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
14
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
15
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2020-14347
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n95v-qmcg-6bek
49
url VCID-nbdz-scr3-hbhv
vulnerability_id VCID-nbdz-scr3-hbhv
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12176
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.7645
published_at 2026-04-29T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76396
published_at 2026-04-21T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-24T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.76436
published_at 2026-04-26T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-16T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76411
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509214
reference_id 1509214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509214
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12176
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbdz-scr3-hbhv
50
url VCID-p1tf-2c6u-tygr
vulnerability_id VCID-p1tf-2c6u-tygr
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
reference_id 2271997
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31080
reference_id CVE-2024-31080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/security/cve/CVE-2024-31080
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-31080
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1tf-2c6u-tygr
51
url VCID-pcn1-ehd2-g3f7
vulnerability_id VCID-pcn1-ehd2-g3f7
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14346
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.37956
published_at 2026-04-01T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38138
published_at 2026-04-02T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38162
published_at 2026-04-04T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38032
published_at 2026-04-07T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38082
published_at 2026-04-08T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38091
published_at 2026-04-09T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38109
published_at 2026-04-11T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38072
published_at 2026-04-12T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38048
published_at 2026-04-13T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38093
published_at 2026-04-16T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.38073
published_at 2026-04-18T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.3801
published_at 2026-04-21T12:55:00Z
12
value 0.00169
scoring_system epss
scoring_elements 0.37794
published_at 2026-04-24T12:55:00Z
13
value 0.00169
scoring_system epss
scoring_elements 0.37772
published_at 2026-04-26T12:55:00Z
14
value 0.00169
scoring_system epss
scoring_elements 0.37678
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14346
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862246
reference_id 1862246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862246
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
14
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2020-14346
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcn1-ehd2-g3f7
52
url VCID-phkz-t2yr-m7em
vulnerability_id VCID-phkz-t2yr-m7em
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
reference_id
reference_type
scores
0
value 0.03015
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-24T12:55:00Z
1
value 0.03015
scoring_system epss
scoring_elements 0.86616
published_at 2026-04-21T12:55:00Z
2
value 0.03015
scoring_system epss
scoring_elements 0.86643
published_at 2026-04-26T12:55:00Z
3
value 0.03015
scoring_system epss
scoring_elements 0.86642
published_at 2026-04-29T12:55:00Z
4
value 0.03264
scoring_system epss
scoring_elements 0.87105
published_at 2026-04-02T12:55:00Z
5
value 0.03264
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-04T12:55:00Z
6
value 0.03264
scoring_system epss
scoring_elements 0.87115
published_at 2026-04-07T12:55:00Z
7
value 0.03264
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-08T12:55:00Z
8
value 0.03264
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-09T12:55:00Z
9
value 0.03264
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-11T12:55:00Z
10
value 0.03264
scoring_system epss
scoring_elements 0.87151
published_at 2026-04-12T12:55:00Z
11
value 0.03264
scoring_system epss
scoring_elements 0.87146
published_at 2026-04-13T12:55:00Z
12
value 0.03264
scoring_system epss
scoring_elements 0.87163
published_at 2026-04-16T12:55:00Z
13
value 0.03264
scoring_system epss
scoring_elements 0.87167
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
reference_id 2257691
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2023-6816
reference_id CVE-2023-6816
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/security/cve/CVE-2023-6816
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2023-6816
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-phkz-t2yr-m7em
53
url VCID-psr2-gkpa-z7fj
vulnerability_id VCID-psr2-gkpa-z7fj
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14360
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28445
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28026
published_at 2026-04-29T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28217
published_at 2026-04-24T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28104
published_at 2026-04-26T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28538
published_at 2026-04-02T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28581
published_at 2026-04-04T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28382
published_at 2026-04-07T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28448
published_at 2026-04-08T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.2849
published_at 2026-04-09T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28494
published_at 2026-04-11T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28451
published_at 2026-04-12T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28401
published_at 2026-04-13T12:55:00Z
12
value 0.00104
scoring_system epss
scoring_elements 0.28417
published_at 2026-04-16T12:55:00Z
13
value 0.00104
scoring_system epss
scoring_elements 0.28396
published_at 2026-04-18T12:55:00Z
14
value 0.00104
scoring_system epss
scoring_elements 0.28343
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869139
reference_id 1869139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869139
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
reference_id 976216
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
7
reference_url https://security.archlinux.org/ASA-202012-6
reference_id ASA-202012-6
reference_type
scores
url https://security.archlinux.org/ASA-202012-6
8
reference_url https://security.archlinux.org/AVG-1310
reference_id AVG-1310
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1310
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:5408
reference_id RHSA-2020:5408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5408
11
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
12
reference_url https://usn.ubuntu.com/4656-1/
reference_id USN-4656-1
reference_type
scores
url https://usn.ubuntu.com/4656-1/
13
reference_url https://usn.ubuntu.com/4656-2/
reference_id USN-4656-2
reference_type
scores
url https://usn.ubuntu.com/4656-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2020-14360
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psr2-gkpa-z7fj
54
url VCID-q8jj-uwq7-qubk
vulnerability_id VCID-q8jj-uwq7-qubk
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2624
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14333
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14179
published_at 2026-04-29T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14269
published_at 2026-04-24T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14244
published_at 2026-04-26T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-02T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14485
published_at 2026-04-04T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14291
published_at 2026-04-07T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14374
published_at 2026-04-08T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14428
published_at 2026-04-09T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14377
published_at 2026-04-11T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.14337
published_at 2026-04-12T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.14282
published_at 2026-04-13T12:55:00Z
12
value 0.00046
scoring_system epss
scoring_elements 0.14173
published_at 2026-04-16T12:55:00Z
13
value 0.00046
scoring_system epss
scoring_elements 0.1417
published_at 2026-04-18T12:55:00Z
14
value 0.00046
scoring_system epss
scoring_elements 0.14241
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:N/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1424984
reference_id 1424984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1424984
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398
reference_id 856398
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398
6
reference_url https://security.gentoo.org/glsa/201704-03
reference_id GLSA-201704-03
reference_type
scores
url https://security.gentoo.org/glsa/201704-03
7
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
8
reference_url https://usn.ubuntu.com/3362-1/
reference_id USN-3362-1
reference_type
scores
url https://usn.ubuntu.com/3362-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
aliases CVE-2017-2624
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8jj-uwq7-qubk
55
url VCID-qwqu-19wq-1ke8
vulnerability_id VCID-qwqu-19wq-1ke8
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26594
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345248
reference_id 2345248
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345248
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26594
reference_id CVE-2025-26594
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/security/cve/CVE-2025-26594
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-26594
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqu-19wq-1ke8
56
url VCID-s7xs-zcxk-nyc7
vulnerability_id VCID-s7xs-zcxk-nyc7
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49179
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17986
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17899
published_at 2026-04-12T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-11T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-09T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18079
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.1778
published_at 2026-04-07T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.357
published_at 2026-04-29T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36079
published_at 2026-04-13T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.3612
published_at 2026-04-16T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36105
published_at 2026-04-18T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36051
published_at 2026-04-21T12:55:00Z
12
value 0.00154
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-24T12:55:00Z
13
value 0.00154
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369978
reference_id 2369978
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369978
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
reference_id 2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://access.redhat.com/security/cve/CVE-2025-49179
reference_id CVE-2025-49179
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/security/cve/CVE-2025-49179
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://www.x.org/wiki/Development/Security/
60
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
61
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-49179
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s7xs-zcxk-nyc7
57
url VCID-sfgy-e6d6-f3fd
vulnerability_id VCID-sfgy-e6d6-f3fd
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49175
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24316
published_at 2026-04-04T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24188
published_at 2026-04-12T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2423
published_at 2026-04-11T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24214
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-07T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.38812
published_at 2026-04-29T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-21T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.38909
published_at 2026-04-24T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.38891
published_at 2026-04-26T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44852
published_at 2026-04-13T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44898
published_at 2026-04-18T12:55:00Z
13
value 0.00222
scoring_system epss
scoring_elements 0.44904
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee
reference_id 0885e0b26225c90534642fe911632ec0779eebee
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024
reference_id 2024
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369947
reference_id 2369947
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369947
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
31
reference_url https://access.redhat.com/security/cve/CVE-2025-49175
reference_id CVE-2025-49175
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/security/cve/CVE-2025-49175
32
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10258
33
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10342
34
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10343
35
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10344
36
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10346
37
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10347
38
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10348
39
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10349
40
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10350
41
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10351
42
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10352
43
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10355
44
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10356
45
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10360
46
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10370
47
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10374
48
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10375
49
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10376
50
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10377
51
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10378
52
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10381
53
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10410
54
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9303
55
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9304
56
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9305
57
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9306
58
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9392
59
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9964
60
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://www.x.org/wiki/Development/Security/
61
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
62
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-49175
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sfgy-e6d6-f3fd
58
url VCID-sx54-5s5r-ckg2
vulnerability_id VCID-sx54-5s5r-ckg2
summary xorg: xwayland: Use-after-free in Xkb client resource removal
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62230
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01226
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02011
published_at 2026-04-29T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0197
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01939
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01933
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01914
published_at 2026-04-16T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01913
published_at 2026-04-18T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01983
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01982
published_at 2026-04-26T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.0089
published_at 2026-04-02T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00892
published_at 2026-04-04T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-07T12:55:00Z
13
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62230
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402653
reference_id 2402653
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402653
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62230
reference_id CVE-2025-62230
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/security/cve/CVE-2025-62230
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-62230
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sx54-5s5r-ckg2
59
url VCID-t1cy-srre-nkbp
vulnerability_id VCID-t1cy-srre-nkbp
summary xorg: xmayland: Value overflow in XkbSetCompatMap()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62231
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01226
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02011
published_at 2026-04-29T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0197
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01939
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01933
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01914
published_at 2026-04-16T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01913
published_at 2026-04-18T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01983
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01982
published_at 2026-04-26T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.0089
published_at 2026-04-02T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00892
published_at 2026-04-04T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-07T12:55:00Z
13
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402660
reference_id 2402660
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402660
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62231
reference_id CVE-2025-62231
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/security/cve/CVE-2025-62231
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-62231
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1cy-srre-nkbp
60
url VCID-tngq-27px-w7cm
vulnerability_id VCID-tngq-27px-w7cm
summary
A vulnerability in X.Org X Server allows local users to escalate
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14665
reference_id
reference_type
scores
0
value 0.08941
scoring_system epss
scoring_elements 0.92554
published_at 2026-04-01T12:55:00Z
1
value 0.08941
scoring_system epss
scoring_elements 0.92606
published_at 2026-04-29T12:55:00Z
2
value 0.08941
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-21T12:55:00Z
3
value 0.08941
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-26T12:55:00Z
4
value 0.08941
scoring_system epss
scoring_elements 0.9256
published_at 2026-04-02T12:55:00Z
5
value 0.08941
scoring_system epss
scoring_elements 0.92567
published_at 2026-04-04T12:55:00Z
6
value 0.08941
scoring_system epss
scoring_elements 0.92569
published_at 2026-04-07T12:55:00Z
7
value 0.08941
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-08T12:55:00Z
8
value 0.08941
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-09T12:55:00Z
9
value 0.08941
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-13T12:55:00Z
10
value 0.08941
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-12T12:55:00Z
11
value 0.08941
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-16T12:55:00Z
12
value 0.08941
scoring_system epss
scoring_elements 0.92604
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1637761
reference_id 1637761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1637761
5
reference_url https://security.archlinux.org/ASA-201810-15
reference_id ASA-201810-15
reference_type
scores
url https://security.archlinux.org/ASA-201810-15
6
reference_url https://security.archlinux.org/AVG-788
reference_id AVG-788
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-788
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb
15
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb
16
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb
17
reference_url https://twitter.com/hackerfantastic/status/1055517801224396800
reference_id CVE-2018-14665
reference_type exploit
scores
url https://twitter.com/hackerfantastic/status/1055517801224396800
18
reference_url https://security.gentoo.org/glsa/201810-09
reference_id GLSA-201810-09
reference_type
scores
url https://security.gentoo.org/glsa/201810-09
19
reference_url https://access.redhat.com/errata/RHSA-2018:3410
reference_id RHSA-2018:3410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3410
20
reference_url https://usn.ubuntu.com/3802-1/
reference_id USN-3802-1
reference_type
scores
url https://usn.ubuntu.com/3802-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
1
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2018-14665
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tngq-27px-w7cm
61
url VCID-trsp-u7xt-a3ck
vulnerability_id VCID-trsp-u7xt-a3ck
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6377
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59416
published_at 2026-04-21T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.60023
published_at 2026-04-29T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.60018
published_at 2026-04-24T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.60036
published_at 2026-04-26T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61372
published_at 2026-04-07T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61434
published_at 2026-04-09T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61455
published_at 2026-04-11T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61441
published_at 2026-04-12T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-13T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61461
published_at 2026-04-16T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61465
published_at 2026-04-18T12:55:00Z
11
value 0.00411
scoring_system epss
scoring_elements 0.61374
published_at 2026-04-02T12:55:00Z
12
value 0.00411
scoring_system epss
scoring_elements 0.61418
published_at 2026-04-08T12:55:00Z
13
value 0.00411
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253291
reference_id 2253291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253291
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7886
reference_id RHSA-2023:7886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7886
8
reference_url https://access.redhat.com/errata/RHSA-2024:0006
reference_id RHSA-2024:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0006
9
reference_url https://access.redhat.com/errata/RHSA-2024:0009
reference_id RHSA-2024:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0009
10
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
11
reference_url https://access.redhat.com/errata/RHSA-2024:0014
reference_id RHSA-2024:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0014
12
reference_url https://access.redhat.com/errata/RHSA-2024:0015
reference_id RHSA-2024:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0015
13
reference_url https://access.redhat.com/errata/RHSA-2024:0016
reference_id RHSA-2024:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0016
14
reference_url https://access.redhat.com/errata/RHSA-2024:0017
reference_id RHSA-2024:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0017
15
reference_url https://access.redhat.com/errata/RHSA-2024:0018
reference_id RHSA-2024:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0018
16
reference_url https://access.redhat.com/errata/RHSA-2024:0020
reference_id RHSA-2024:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0020
17
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
18
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
19
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
20
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
21
reference_url https://access.redhat.com/errata/RHSA-2025:13998
reference_id RHSA-2025:13998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13998
22
reference_url https://usn.ubuntu.com/6555-1/
reference_id USN-6555-1
reference_type
scores
url https://usn.ubuntu.com/6555-1/
23
reference_url https://usn.ubuntu.com/6555-2/
reference_id USN-6555-2
reference_type
scores
url https://usn.ubuntu.com/6555-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2023-6377
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trsp-u7xt-a3ck
62
url VCID-un9v-4svv-2baj
vulnerability_id VCID-un9v-4svv-2baj
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20089
published_at 2026-04-02T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20146
published_at 2026-04-04T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19876
published_at 2026-04-07T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-08T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-09T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-11T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19985
published_at 2026-04-12T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19927
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19905
published_at 2026-04-16T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19909
published_at 2026-04-18T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19906
published_at 2026-04-21T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19799
published_at 2026-04-24T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19794
published_at 2026-04-26T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
reference_id 2243091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:6802
reference_id RHSA-2023:6802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6802
8
reference_url https://access.redhat.com/errata/RHSA-2023:6808
reference_id RHSA-2023:6808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6808
9
reference_url https://access.redhat.com/errata/RHSA-2023:7373
reference_id RHSA-2023:7373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7373
10
reference_url https://access.redhat.com/errata/RHSA-2023:7388
reference_id RHSA-2023:7388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7388
11
reference_url https://access.redhat.com/errata/RHSA-2023:7405
reference_id RHSA-2023:7405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7405
12
reference_url https://access.redhat.com/errata/RHSA-2023:7428
reference_id RHSA-2023:7428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7428
13
reference_url https://access.redhat.com/errata/RHSA-2023:7436
reference_id RHSA-2023:7436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7436
14
reference_url https://access.redhat.com/errata/RHSA-2023:7526
reference_id RHSA-2023:7526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7526
15
reference_url https://access.redhat.com/errata/RHSA-2023:7533
reference_id RHSA-2023:7533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7533
16
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
17
reference_url https://access.redhat.com/errata/RHSA-2024:0128
reference_id RHSA-2024:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0128
18
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
19
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
20
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
21
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
22
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
23
reference_url https://usn.ubuntu.com/6453-1/
reference_id USN-6453-1
reference_type
scores
url https://usn.ubuntu.com/6453-1/
24
reference_url https://usn.ubuntu.com/6453-2/
reference_id USN-6453-2
reference_type
scores
url https://usn.ubuntu.com/6453-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2023-5367
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un9v-4svv-2baj
63
url VCID-uxsy-k3cg-mkdd
vulnerability_id VCID-uxsy-k3cg-mkdd
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
9
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
reference_id 2151758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46343
reference_id CVE-2022-46343
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://access.redhat.com/security/cve/CVE-2022-46343
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2022-46343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd
64
url VCID-v2jb-vhek-fkcz
vulnerability_id VCID-v2jb-vhek-fkcz
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31082
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09653
published_at 2026-04-29T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09526
published_at 2026-04-16T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.0953
published_at 2026-04-18T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.0968
published_at 2026-04-21T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09729
published_at 2026-04-24T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09695
published_at 2026-04-26T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09587
published_at 2026-04-02T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09639
published_at 2026-04-04T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09548
published_at 2026-04-07T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09622
published_at 2026-04-08T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09671
published_at 2026-04-09T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09683
published_at 2026-04-11T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.0965
published_at 2026-04-12T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09635
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2024-April/003497.html
reference_id 003497.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/
url https://lists.x.org/archives/xorg-announce/2024-April/003497.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271999
reference_id 2271999
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271999
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2024-31082
reference_id CVE-2024-31082
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/
url https://access.redhat.com/security/cve/CVE-2024-31082
12
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
13
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-31082
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v2jb-vhek-fkcz
65
url VCID-v8w1-zu65-c7ac
vulnerability_id VCID-v8w1-zu65-c7ac
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13723
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33335
published_at 2026-04-01T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.3309
published_at 2026-04-29T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33399
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33374
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33342
published_at 2026-04-21T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33187
published_at 2026-04-24T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.3317
published_at 2026-04-26T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33473
published_at 2026-04-02T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33505
published_at 2026-04-04T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33346
published_at 2026-04-07T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-08T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33425
published_at 2026-04-09T12:55:00Z
12
value 0.00136
scoring_system epss
scoring_elements 0.33429
published_at 2026-04-11T12:55:00Z
13
value 0.00136
scoring_system epss
scoring_elements 0.33387
published_at 2026-04-12T12:55:00Z
14
value 0.00136
scoring_system epss
scoring_elements 0.33364
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13723
2
reference_url https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
reference_id
reference_type
scores
url https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
19
reference_url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
reference_id
reference_type
scores
url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
20
reference_url http://www.debian.org/security/2017/dsa-4000
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-4000
21
reference_url http://www.openwall.com/lists/oss-security/2017/10/04/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/10/04/10
22
reference_url http://www.securityfocus.com/bid/101253
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101253
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500388
reference_id 1500388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500388
24
reference_url https://security.archlinux.org/ASA-201710-10
reference_id ASA-201710-10
reference_type
scores
url https://security.archlinux.org/ASA-201710-10
25
reference_url https://security.archlinux.org/AVG-432
reference_id AVG-432
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-432
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13723
reference_id CVE-2017-13723
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13723
30
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
31
reference_url https://usn.ubuntu.com/3453-1/
reference_id USN-3453-1
reference_type
scores
url https://usn.ubuntu.com/3453-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-13723
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8w1-zu65-c7ac
66
url VCID-v9p1-8sb6-9ufr
vulnerability_id VCID-v9p1-8sb6-9ufr
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
reference_id 2256540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21885
reference_id CVE-2024-21885
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/security/cve/CVE-2024-21885
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2024-21885
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9p1-8sb6-9ufr
67
url VCID-wh9v-35ju-vbcb
vulnerability_id VCID-wh9v-35ju-vbcb
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-02T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69768
published_at 2026-04-07T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69792
published_at 2026-04-04T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69816
published_at 2026-04-08T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69831
published_at 2026-04-09T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69854
published_at 2026-04-11T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69839
published_at 2026-04-12T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69824
published_at 2026-04-13T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72341
published_at 2026-04-29T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72292
published_at 2026-04-21T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72336
published_at 2026-04-24T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.72345
published_at 2026-04-26T12:55:00Z
12
value 0.00711
scoring_system epss
scoring_elements 0.72295
published_at 2026-04-16T12:55:00Z
13
value 0.00711
scoring_system epss
scoring_elements 0.72304
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
reference_id 003320.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
5
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
reference_id 0ba6d8c37071131a49790243cdac55392ecf71ec
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
reference_id 1030777
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
reference_id 2165995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://access.redhat.com/errata/RHSA-2023:0622
reference_id RHSA-2023:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0622
10
reference_url https://access.redhat.com/errata/RHSA-2023:0623
reference_id RHSA-2023:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0623
11
reference_url https://access.redhat.com/errata/RHSA-2023:0662
reference_id RHSA-2023:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0662
12
reference_url https://access.redhat.com/errata/RHSA-2023:0663
reference_id RHSA-2023:0663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0663
13
reference_url https://access.redhat.com/errata/RHSA-2023:0664
reference_id RHSA-2023:0664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0664
14
reference_url https://access.redhat.com/errata/RHSA-2023:0665
reference_id RHSA-2023:0665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0665
15
reference_url https://access.redhat.com/errata/RHSA-2023:0671
reference_id RHSA-2023:0671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0671
16
reference_url https://access.redhat.com/errata/RHSA-2023:0675
reference_id RHSA-2023:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0675
17
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
18
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
19
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
20
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
23
reference_url https://usn.ubuntu.com/5846-1/
reference_id USN-5846-1
reference_type
scores
url https://usn.ubuntu.com/5846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2023-0494
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh9v-35ju-vbcb
68
url VCID-wp8b-r6p1-7kcf
vulnerability_id VCID-wp8b-r6p1-7kcf
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23801
published_at 2026-04-02T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23662
published_at 2026-04-16T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2365
published_at 2026-04-13T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23706
published_at 2026-04-12T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-11T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23734
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-08T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-04T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23618
published_at 2026-04-07T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.2586
published_at 2026-04-29T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26007
published_at 2026-04-18T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25972
published_at 2026-04-21T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25912
published_at 2026-04-24T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25908
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2023/03/29/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://www.openwall.com/lists/oss-security/2023/03/29/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
reference_id 2180288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
reference_id 26ef545b3502f61ca722a7a3373507e88ef64110
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
reference_id BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
reference_id H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
reference_id MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
reference_id NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
reference_id PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
reference_id QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
14
reference_url https://access.redhat.com/errata/RHSA-2023:1548
reference_id RHSA-2023:1548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1548
15
reference_url https://access.redhat.com/errata/RHSA-2023:1549
reference_id RHSA-2023:1549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1549
16
reference_url https://access.redhat.com/errata/RHSA-2023:1551
reference_id RHSA-2023:1551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1551
17
reference_url https://access.redhat.com/errata/RHSA-2023:1592
reference_id RHSA-2023:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1592
18
reference_url https://access.redhat.com/errata/RHSA-2023:1594
reference_id RHSA-2023:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1594
19
reference_url https://access.redhat.com/errata/RHSA-2023:1598
reference_id RHSA-2023:1598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1598
20
reference_url https://access.redhat.com/errata/RHSA-2023:1599
reference_id RHSA-2023:1599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1599
21
reference_url https://access.redhat.com/errata/RHSA-2023:1600
reference_id RHSA-2023:1600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1600
22
reference_url https://access.redhat.com/errata/RHSA-2023:6340
reference_id RHSA-2023:6340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6340
23
reference_url https://access.redhat.com/errata/RHSA-2023:6341
reference_id RHSA-2023:6341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6341
24
reference_url https://access.redhat.com/errata/RHSA-2023:6916
reference_id RHSA-2023:6916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6916
25
reference_url https://access.redhat.com/errata/RHSA-2023:6917
reference_id RHSA-2023:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6917
26
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
reference_id SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
reference_id SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
29
reference_url https://usn.ubuntu.com/5986-1/
reference_id USN-5986-1
reference_type
scores
url https://usn.ubuntu.com/5986-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2023-1393
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wp8b-r6p1-7kcf
69
url VCID-wq4p-h17p-fyf4
vulnerability_id VCID-wq4p-h17p-fyf4
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25712
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33044
published_at 2026-04-01T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.32796
published_at 2026-04-29T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.32888
published_at 2026-04-24T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-26T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33174
published_at 2026-04-02T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-04T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33038
published_at 2026-04-07T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.33081
published_at 2026-04-08T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.33114
published_at 2026-04-09T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.33116
published_at 2026-04-11T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.33078
published_at 2026-04-12T12:55:00Z
11
value 0.00134
scoring_system epss
scoring_elements 0.33054
published_at 2026-04-13T12:55:00Z
12
value 0.00134
scoring_system epss
scoring_elements 0.33096
published_at 2026-04-16T12:55:00Z
13
value 0.00134
scoring_system epss
scoring_elements 0.33072
published_at 2026-04-18T12:55:00Z
14
value 0.00134
scoring_system epss
scoring_elements 0.33035
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25712
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1887276
reference_id 1887276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1887276
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
reference_id 976216
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
7
reference_url https://security.archlinux.org/ASA-202012-6
reference_id ASA-202012-6
reference_type
scores
url https://security.archlinux.org/ASA-202012-6
8
reference_url https://security.archlinux.org/AVG-1310
reference_id AVG-1310
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1310
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:5408
reference_id RHSA-2020:5408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5408
11
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
12
reference_url https://usn.ubuntu.com/4656-1/
reference_id USN-4656-1
reference_type
scores
url https://usn.ubuntu.com/4656-1/
13
reference_url https://usn.ubuntu.com/4656-2/
reference_id USN-4656-2
reference_type
scores
url https://usn.ubuntu.com/4656-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2020-25712
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wq4p-h17p-fyf4
70
url VCID-wyuw-13t9-rbg1
vulnerability_id VCID-wyuw-13t9-rbg1
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49176
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24316
published_at 2026-04-04T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24188
published_at 2026-04-12T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2423
published_at 2026-04-11T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24214
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-07T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44675
published_at 2026-04-29T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44852
published_at 2026-04-13T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44904
published_at 2026-04-16T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44898
published_at 2026-04-18T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44832
published_at 2026-04-21T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44745
published_at 2026-04-24T12:55:00Z
13
value 0.00222
scoring_system epss
scoring_elements 0.44752
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9
reference_id 03731b326a80b582e48d939fe62cb1e2b10400d9
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073
reference_id 1108073
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369954
reference_id 2369954
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369954
8
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
reference_id 4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
32
reference_url https://access.redhat.com/security/cve/CVE-2025-49176
reference_id CVE-2025-49176
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/security/cve/CVE-2025-49176
33
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10258
34
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10342
35
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10343
36
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10344
37
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10346
38
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10347
39
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10348
40
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10349
41
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10350
42
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10351
43
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10352
44
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10355
45
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10356
46
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10360
47
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10370
48
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10374
49
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10375
50
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10376
51
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10377
52
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10378
53
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10381
54
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10410
55
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9303
56
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9304
57
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9305
58
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9306
59
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9392
60
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9964
61
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://www.x.org/wiki/Development/Security/
62
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
63
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11
aliases CVE-2025-49176
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyuw-13t9-rbg1
71
url VCID-x3p6-a59z-ebf3
vulnerability_id VCID-x3p6-a59z-ebf3
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
reference_id
reference_type
scores
0
value 0.00958
scoring_system epss
scoring_elements 0.76482
published_at 2026-04-21T12:55:00Z
1
value 0.01143
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-29T12:55:00Z
2
value 0.01143
scoring_system epss
scoring_elements 0.78499
published_at 2026-04-24T12:55:00Z
3
value 0.01143
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-26T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78941
published_at 2026-04-07T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-09T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.78996
published_at 2026-04-18T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-12T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78971
published_at 2026-04-13T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-16T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-02T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.78966
published_at 2026-04-08T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.78958
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
reference_id 2253298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7886
reference_id RHSA-2023:7886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7886
8
reference_url https://access.redhat.com/errata/RHSA-2024:0006
reference_id RHSA-2024:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0006
9
reference_url https://access.redhat.com/errata/RHSA-2024:0009
reference_id RHSA-2024:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0009
10
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
11
reference_url https://access.redhat.com/errata/RHSA-2024:0014
reference_id RHSA-2024:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0014
12
reference_url https://access.redhat.com/errata/RHSA-2024:0015
reference_id RHSA-2024:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0015
13
reference_url https://access.redhat.com/errata/RHSA-2024:0016
reference_id RHSA-2024:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0016
14
reference_url https://access.redhat.com/errata/RHSA-2024:0017
reference_id RHSA-2024:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0017
15
reference_url https://access.redhat.com/errata/RHSA-2024:0018
reference_id RHSA-2024:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0018
16
reference_url https://access.redhat.com/errata/RHSA-2024:0020
reference_id RHSA-2024:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0020
17
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
18
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
19
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
20
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/6555-1/
reference_id USN-6555-1
reference_type
scores
url https://usn.ubuntu.com/6555-1/
23
reference_url https://usn.ubuntu.com/6555-2/
reference_id USN-6555-2
reference_type
scores
url https://usn.ubuntu.com/6555-2/
24
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2023-6478
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3p6-a59z-ebf3
72
url VCID-xk4b-12p1-ckam
vulnerability_id VCID-xk4b-12p1-ckam
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12186
reference_id
reference_type
scores
0
value 0.00754
scoring_system epss
scoring_elements 0.73175
published_at 2026-04-01T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.73319
published_at 2026-04-29T12:55:00Z
2
value 0.00754
scoring_system epss
scoring_elements 0.73307
published_at 2026-04-24T12:55:00Z
3
value 0.00754
scoring_system epss
scoring_elements 0.7332
published_at 2026-04-26T12:55:00Z
4
value 0.00754
scoring_system epss
scoring_elements 0.73185
published_at 2026-04-02T12:55:00Z
5
value 0.00754
scoring_system epss
scoring_elements 0.73205
published_at 2026-04-04T12:55:00Z
6
value 0.00754
scoring_system epss
scoring_elements 0.73179
published_at 2026-04-07T12:55:00Z
7
value 0.00754
scoring_system epss
scoring_elements 0.73216
published_at 2026-04-08T12:55:00Z
8
value 0.00754
scoring_system epss
scoring_elements 0.73229
published_at 2026-04-09T12:55:00Z
9
value 0.00754
scoring_system epss
scoring_elements 0.73254
published_at 2026-04-11T12:55:00Z
10
value 0.00754
scoring_system epss
scoring_elements 0.73235
published_at 2026-04-12T12:55:00Z
11
value 0.00754
scoring_system epss
scoring_elements 0.73228
published_at 2026-04-13T12:55:00Z
12
value 0.00754
scoring_system epss
scoring_elements 0.73271
published_at 2026-04-16T12:55:00Z
13
value 0.00754
scoring_system epss
scoring_elements 0.7328
published_at 2026-04-18T12:55:00Z
14
value 0.00754
scoring_system epss
scoring_elements 0.73273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509216
reference_id 1509216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509216
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
purl pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2
1
url pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
purl pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-hhnr-av5b-t7dc
40
vulnerability VCID-hkrr-v71f-xqdb
41
vulnerability VCID-hzj2-b4e4-ubf6
42
vulnerability VCID-j6qd-r6ua-cfbm
43
vulnerability VCID-jrx7-pbf3-h3at
44
vulnerability VCID-juet-bb4m-hkhq
45
vulnerability VCID-jvgv-d94j-mqa1
46
vulnerability VCID-m2hp-k4c4-m3db
47
vulnerability VCID-n95v-qmcg-6bek
48
vulnerability VCID-nbdz-scr3-hbhv
49
vulnerability VCID-p1tf-2c6u-tygr
50
vulnerability VCID-pcn1-ehd2-g3f7
51
vulnerability VCID-phkz-t2yr-m7em
52
vulnerability VCID-psr2-gkpa-z7fj
53
vulnerability VCID-qwqu-19wq-1ke8
54
vulnerability VCID-s7xs-zcxk-nyc7
55
vulnerability VCID-sfgy-e6d6-f3fd
56
vulnerability VCID-sx54-5s5r-ckg2
57
vulnerability VCID-t1cy-srre-nkbp
58
vulnerability VCID-tngq-27px-w7cm
59
vulnerability VCID-trsp-u7xt-a3ck
60
vulnerability VCID-un9v-4svv-2baj
61
vulnerability VCID-uxsy-k3cg-mkdd
62
vulnerability VCID-v2jb-vhek-fkcz
63
vulnerability VCID-v8w1-zu65-c7ac
64
vulnerability VCID-v9p1-8sb6-9ufr
65
vulnerability VCID-wh9v-35ju-vbcb
66
vulnerability VCID-wp8b-r6p1-7kcf
67
vulnerability VCID-wq4p-h17p-fyf4
68
vulnerability VCID-wyuw-13t9-rbg1
69
vulnerability VCID-x3p6-a59z-ebf3
70
vulnerability VCID-xk4b-12p1-ckam
71
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5
2
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
aliases CVE-2017-12186
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xk4b-12p1-ckam
73
url VCID-zhdy-8stm-q3ey
vulnerability_id VCID-zhdy-8stm-q3ey
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4009
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25795
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25546
published_at 2026-04-29T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25661
published_at 2026-04-21T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-24T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25596
published_at 2026-04-26T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25855
published_at 2026-04-02T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25898
published_at 2026-04-04T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.2567
published_at 2026-04-07T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25741
published_at 2026-04-08T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25789
published_at 2026-04-09T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25799
published_at 2026-04-11T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25757
published_at 2026-04-12T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25699
published_at 2026-04-13T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25702
published_at 2026-04-16T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25684
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4009
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026072
reference_id 2026072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026072
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
purl pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-28er-gwh3-rugq
4
vulnerability VCID-2cp3-p3yx-17be
5
vulnerability VCID-2vrb-n6cc-c7bc
6
vulnerability VCID-37e1-pzxj-2fdt
7
vulnerability VCID-41cd-s77z-6bcc
8
vulnerability VCID-44yr-b94s-nfd5
9
vulnerability VCID-49m7-vqbk-s3ce
10
vulnerability VCID-4ngr-6ccu-r7fv
11
vulnerability VCID-515f-a8yj-4fej
12
vulnerability VCID-5awx-j7z7-qyak
13
vulnerability VCID-68t6-6w3n-jffa
14
vulnerability VCID-6hwh-7tvr-sqgn
15
vulnerability VCID-6qsh-kaxk-zuf9
16
vulnerability VCID-6rcq-qxef-nuf7
17
vulnerability VCID-7nax-5yw9-eye8
18
vulnerability VCID-9cjy-6fj5-r7ag
19
vulnerability VCID-a4bk-m98g-93f8
20
vulnerability VCID-bv8h-xa48-hbh7
21
vulnerability VCID-bvay-s9w4-muf8
22
vulnerability VCID-e7w3-3hpm-hbec
23
vulnerability VCID-e9px-edn1-tufs
24
vulnerability VCID-em7x-adw1-tyaz
25
vulnerability VCID-fcac-qzvs-rfa8
26
vulnerability VCID-fgnr-h7rm-83d4
27
vulnerability VCID-hhnr-av5b-t7dc
28
vulnerability VCID-hkrr-v71f-xqdb
29
vulnerability VCID-hzj2-b4e4-ubf6
30
vulnerability VCID-j6qd-r6ua-cfbm
31
vulnerability VCID-jrx7-pbf3-h3at
32
vulnerability VCID-juet-bb4m-hkhq
33
vulnerability VCID-m2hp-k4c4-m3db
34
vulnerability VCID-n95v-qmcg-6bek
35
vulnerability VCID-p1tf-2c6u-tygr
36
vulnerability VCID-pcn1-ehd2-g3f7
37
vulnerability VCID-phkz-t2yr-m7em
38
vulnerability VCID-psr2-gkpa-z7fj
39
vulnerability VCID-qwqu-19wq-1ke8
40
vulnerability VCID-s7xs-zcxk-nyc7
41
vulnerability VCID-sfgy-e6d6-f3fd
42
vulnerability VCID-sx54-5s5r-ckg2
43
vulnerability VCID-t1cy-srre-nkbp
44
vulnerability VCID-trsp-u7xt-a3ck
45
vulnerability VCID-un9v-4svv-2baj
46
vulnerability VCID-uxsy-k3cg-mkdd
47
vulnerability VCID-v2jb-vhek-fkcz
48
vulnerability VCID-v9p1-8sb6-9ufr
49
vulnerability VCID-wh9v-35ju-vbcb
50
vulnerability VCID-wp8b-r6p1-7kcf
51
vulnerability VCID-wq4p-h17p-fyf4
52
vulnerability VCID-wyuw-13t9-rbg1
53
vulnerability VCID-x3p6-a59z-ebf3
54
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pcv-f5h3-9fe9
1
vulnerability VCID-2cp3-p3yx-17be
2
vulnerability VCID-2vrb-n6cc-c7bc
3
vulnerability VCID-37e1-pzxj-2fdt
4
vulnerability VCID-3f4a-m4rt-qqej
5
vulnerability VCID-41cd-s77z-6bcc
6
vulnerability VCID-515f-a8yj-4fej
7
vulnerability VCID-6hwh-7tvr-sqgn
8
vulnerability VCID-7nax-5yw9-eye8
9
vulnerability VCID-b14x-4mtq-5fc7
10
vulnerability VCID-cxf3-8znp-rbbz
11
vulnerability VCID-e9px-edn1-tufs
12
vulnerability VCID-hkrr-v71f-xqdb
13
vulnerability VCID-hxab-xyu1-xkgc
14
vulnerability VCID-juet-bb4m-hkhq
15
vulnerability VCID-pa9n-ntq3-jqaz
16
vulnerability VCID-qwqu-19wq-1ke8
17
vulnerability VCID-s7xs-zcxk-nyc7
18
vulnerability VCID-sfgy-e6d6-f3fd
19
vulnerability VCID-sx54-5s5r-ckg2
20
vulnerability VCID-t1cy-srre-nkbp
21
vulnerability VCID-wyuw-13t9-rbg1
22
vulnerability VCID-wzer-jnm3-rqa8
23
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13
aliases CVE-2021-4009
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhdy-8stm-q3ey
Fixing_vulnerabilities
0
url VCID-42nu-8tap-5fbj
vulnerability_id VCID-42nu-8tap-5fbj
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8095
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-29T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-01T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78137
published_at 2026-04-02T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78166
published_at 2026-04-04T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78149
published_at 2026-04-07T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78175
published_at 2026-04-08T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-09T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78207
published_at 2026-04-11T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78189
published_at 2026-04-12T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-13T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78218
published_at 2026-04-16T12:55:00Z
11
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-18T12:55:00Z
12
value 0.01115
scoring_system epss
scoring_elements 0.78211
published_at 2026-04-21T12:55:00Z
13
value 0.01115
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-24T12:55:00Z
14
value 0.01115
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8095
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71599
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71599
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168694
reference_id 1168694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168694
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8095
reference_id CVE-2014-8095
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8095
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8095
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42nu-8tap-5fbj
1
url VCID-4phf-c3vm-23db
vulnerability_id VCID-4phf-c3vm-23db
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8100
reference_id
reference_type
scores
0
value 0.01297
scoring_system epss
scoring_elements 0.79785
published_at 2026-04-29T12:55:00Z
1
value 0.01297
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-01T12:55:00Z
2
value 0.01297
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-02T12:55:00Z
3
value 0.01297
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-04T12:55:00Z
4
value 0.01297
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-07T12:55:00Z
5
value 0.01297
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-08T12:55:00Z
6
value 0.01297
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-09T12:55:00Z
7
value 0.01297
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-11T12:55:00Z
8
value 0.01297
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-12T12:55:00Z
9
value 0.01297
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-13T12:55:00Z
10
value 0.01297
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-16T12:55:00Z
11
value 0.01297
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-18T12:55:00Z
12
value 0.01297
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-21T12:55:00Z
13
value 0.01297
scoring_system epss
scoring_elements 0.79763
published_at 2026-04-24T12:55:00Z
14
value 0.01297
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8100
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71602
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71602
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168711
reference_id 1168711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168711
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8100
reference_id CVE-2014-8100
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8100
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8100
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4phf-c3vm-23db
2
url VCID-537j-hg6y-jbgb
vulnerability_id VCID-537j-hg6y-jbgb
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8102
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-29T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-01T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78137
published_at 2026-04-02T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78166
published_at 2026-04-04T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78149
published_at 2026-04-07T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78175
published_at 2026-04-08T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-09T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78207
published_at 2026-04-11T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78189
published_at 2026-04-12T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-13T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78218
published_at 2026-04-16T12:55:00Z
11
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-18T12:55:00Z
12
value 0.01115
scoring_system epss
scoring_elements 0.78211
published_at 2026-04-21T12:55:00Z
13
value 0.01115
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-24T12:55:00Z
14
value 0.01115
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8102
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71608
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71608
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168714
reference_id 1168714
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168714
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8102
reference_id CVE-2014-8102
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8102
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8102
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-537j-hg6y-jbgb
3
url VCID-5gza-pvdd-zycf
vulnerability_id VCID-5gza-pvdd-zycf
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0255
reference_id
reference_type
scores
0
value 0.06422
scoring_system epss
scoring_elements 0.91004
published_at 2026-04-01T12:55:00Z
1
value 0.06422
scoring_system epss
scoring_elements 0.91009
published_at 2026-04-02T12:55:00Z
2
value 0.06422
scoring_system epss
scoring_elements 0.91018
published_at 2026-04-04T12:55:00Z
3
value 0.06422
scoring_system epss
scoring_elements 0.91028
published_at 2026-04-07T12:55:00Z
4
value 0.06422
scoring_system epss
scoring_elements 0.91041
published_at 2026-04-08T12:55:00Z
5
value 0.06422
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-09T12:55:00Z
6
value 0.06422
scoring_system epss
scoring_elements 0.91056
published_at 2026-04-12T12:55:00Z
7
value 0.06422
scoring_system epss
scoring_elements 0.91055
published_at 2026-04-13T12:55:00Z
8
value 0.06422
scoring_system epss
scoring_elements 0.91079
published_at 2026-04-18T12:55:00Z
9
value 0.06422
scoring_system epss
scoring_elements 0.91081
published_at 2026-04-21T12:55:00Z
10
value 0.06422
scoring_system epss
scoring_elements 0.91094
published_at 2026-04-24T12:55:00Z
11
value 0.06422
scoring_system epss
scoring_elements 0.91092
published_at 2026-04-26T12:55:00Z
12
value 0.06422
scoring_system epss
scoring_elements 0.91087
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0255
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1189062
reference_id 1189062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1189062
4
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
5
reference_url https://access.redhat.com/errata/RHSA-2015:0797
reference_id RHSA-2015:0797
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0797
6
reference_url https://usn.ubuntu.com/2500-1/
reference_id USN-2500-1
reference_type
scores
url https://usn.ubuntu.com/2500-1/
7
reference_url https://usn.ubuntu.com/USN-4772-1/
reference_id USN-USN-4772-1
reference_type
scores
url https://usn.ubuntu.com/USN-4772-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2015-0255
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5gza-pvdd-zycf
4
url VCID-agtx-nbcj-jufj
vulnerability_id VCID-agtx-nbcj-jufj
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4396
reference_id
reference_type
scores
0
value 0.01971
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-01T12:55:00Z
1
value 0.01971
scoring_system epss
scoring_elements 0.83484
published_at 2026-04-02T12:55:00Z
2
value 0.01971
scoring_system epss
scoring_elements 0.83498
published_at 2026-04-07T12:55:00Z
3
value 0.01971
scoring_system epss
scoring_elements 0.83522
published_at 2026-04-08T12:55:00Z
4
value 0.01971
scoring_system epss
scoring_elements 0.83531
published_at 2026-04-09T12:55:00Z
5
value 0.01971
scoring_system epss
scoring_elements 0.83546
published_at 2026-04-11T12:55:00Z
6
value 0.01971
scoring_system epss
scoring_elements 0.8354
published_at 2026-04-12T12:55:00Z
7
value 0.01971
scoring_system epss
scoring_elements 0.83536
published_at 2026-04-13T12:55:00Z
8
value 0.01971
scoring_system epss
scoring_elements 0.8357
published_at 2026-04-16T12:55:00Z
9
value 0.01971
scoring_system epss
scoring_elements 0.83571
published_at 2026-04-18T12:55:00Z
10
value 0.01971
scoring_system epss
scoring_elements 0.83572
published_at 2026-04-21T12:55:00Z
11
value 0.01971
scoring_system epss
scoring_elements 0.83597
published_at 2026-04-24T12:55:00Z
12
value 0.01971
scoring_system epss
scoring_elements 0.83604
published_at 2026-04-26T12:55:00Z
13
value 0.01971
scoring_system epss
scoring_elements 0.83608
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1014561
reference_id 1014561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1014561
4
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
5
reference_url https://access.redhat.com/errata/RHSA-2013:1426
reference_id RHSA-2013:1426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1426
6
reference_url https://usn.ubuntu.com/1990-1/
reference_id USN-1990-1
reference_type
scores
url https://usn.ubuntu.com/1990-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2013-4396
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-agtx-nbcj-jufj
5
url VCID-c9vv-1x48-9uej
vulnerability_id VCID-c9vv-1x48-9uej
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8094
reference_id
reference_type
scores
0
value 0.01042
scoring_system epss
scoring_elements 0.77528
published_at 2026-04-29T12:55:00Z
1
value 0.01042
scoring_system epss
scoring_elements 0.77386
published_at 2026-04-01T12:55:00Z
2
value 0.01042
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-02T12:55:00Z
3
value 0.01042
scoring_system epss
scoring_elements 0.77419
published_at 2026-04-04T12:55:00Z
4
value 0.01042
scoring_system epss
scoring_elements 0.77399
published_at 2026-04-07T12:55:00Z
5
value 0.01042
scoring_system epss
scoring_elements 0.77429
published_at 2026-04-08T12:55:00Z
6
value 0.01042
scoring_system epss
scoring_elements 0.77439
published_at 2026-04-09T12:55:00Z
7
value 0.01042
scoring_system epss
scoring_elements 0.77464
published_at 2026-04-11T12:55:00Z
8
value 0.01042
scoring_system epss
scoring_elements 0.77445
published_at 2026-04-12T12:55:00Z
9
value 0.01042
scoring_system epss
scoring_elements 0.77441
published_at 2026-04-13T12:55:00Z
10
value 0.01042
scoring_system epss
scoring_elements 0.77481
published_at 2026-04-16T12:55:00Z
11
value 0.01042
scoring_system epss
scoring_elements 0.77479
published_at 2026-04-18T12:55:00Z
12
value 0.01042
scoring_system epss
scoring_elements 0.77472
published_at 2026-04-21T12:55:00Z
13
value 0.01042
scoring_system epss
scoring_elements 0.77506
published_at 2026-04-24T12:55:00Z
14
value 0.01042
scoring_system epss
scoring_elements 0.77513
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8094
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.securityfocus.com/bid/71601
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71601
21
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168691
reference_id 1168691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168691
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8094
reference_id CVE-2014-8094
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8094
184
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
185
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
186
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8094
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9vv-1x48-9uej
6
url VCID-hsa9-8jn1-jyhr
vulnerability_id VCID-hsa9-8jn1-jyhr
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8101
reference_id
reference_type
scores
0
value 0.01269
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-29T12:55:00Z
1
value 0.01269
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-01T12:55:00Z
2
value 0.01269
scoring_system epss
scoring_elements 0.79434
published_at 2026-04-02T12:55:00Z
3
value 0.01269
scoring_system epss
scoring_elements 0.79458
published_at 2026-04-04T12:55:00Z
4
value 0.01269
scoring_system epss
scoring_elements 0.79445
published_at 2026-04-07T12:55:00Z
5
value 0.01269
scoring_system epss
scoring_elements 0.79473
published_at 2026-04-08T12:55:00Z
6
value 0.01269
scoring_system epss
scoring_elements 0.79482
published_at 2026-04-09T12:55:00Z
7
value 0.01269
scoring_system epss
scoring_elements 0.79504
published_at 2026-04-11T12:55:00Z
8
value 0.01269
scoring_system epss
scoring_elements 0.79487
published_at 2026-04-12T12:55:00Z
9
value 0.01269
scoring_system epss
scoring_elements 0.79476
published_at 2026-04-13T12:55:00Z
10
value 0.01269
scoring_system epss
scoring_elements 0.79507
published_at 2026-04-16T12:55:00Z
11
value 0.01269
scoring_system epss
scoring_elements 0.79505
published_at 2026-04-18T12:55:00Z
12
value 0.01269
scoring_system epss
scoring_elements 0.79509
published_at 2026-04-21T12:55:00Z
13
value 0.01269
scoring_system epss
scoring_elements 0.79541
published_at 2026-04-24T12:55:00Z
14
value 0.01269
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8101
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
21
reference_url http://www.securityfocus.com/bid/71605
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71605
22
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168713
reference_id 1168713
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168713
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8101
reference_id CVE-2014-8101
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8101
28
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
29
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
30
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
31
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8101
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsa9-8jn1-jyhr
7
url VCID-jbua-ftmv-fygf
vulnerability_id VCID-jbua-ftmv-fygf
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
reference_id
reference_type
scores
url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8098
reference_id
reference_type
scores
0
value 0.0101
scoring_system epss
scoring_elements 0.77185
published_at 2026-04-29T12:55:00Z
1
value 0.0101
scoring_system epss
scoring_elements 0.77036
published_at 2026-04-01T12:55:00Z
2
value 0.0101
scoring_system epss
scoring_elements 0.77041
published_at 2026-04-02T12:55:00Z
3
value 0.0101
scoring_system epss
scoring_elements 0.7707
published_at 2026-04-04T12:55:00Z
4
value 0.0101
scoring_system epss
scoring_elements 0.77052
published_at 2026-04-07T12:55:00Z
5
value 0.0101
scoring_system epss
scoring_elements 0.77084
published_at 2026-04-08T12:55:00Z
6
value 0.0101
scoring_system epss
scoring_elements 0.77094
published_at 2026-04-09T12:55:00Z
7
value 0.0101
scoring_system epss
scoring_elements 0.77121
published_at 2026-04-11T12:55:00Z
8
value 0.0101
scoring_system epss
scoring_elements 0.77101
published_at 2026-04-12T12:55:00Z
9
value 0.0101
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-13T12:55:00Z
10
value 0.0101
scoring_system epss
scoring_elements 0.77137
published_at 2026-04-16T12:55:00Z
11
value 0.0101
scoring_system epss
scoring_elements 0.77139
published_at 2026-04-18T12:55:00Z
12
value 0.0101
scoring_system epss
scoring_elements 0.7713
published_at 2026-04-21T12:55:00Z
13
value 0.0101
scoring_system epss
scoring_elements 0.77164
published_at 2026-04-24T12:55:00Z
14
value 0.0101
scoring_system epss
scoring_elements 0.77171
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8098
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
16
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
17
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
18
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71606
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71606
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168707
reference_id 1168707
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168707
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8098
reference_id CVE-2014-8098
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8098
30
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
31
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
32
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
33
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
34
reference_url https://usn.ubuntu.com/2438-1/
reference_id USN-2438-1
reference_type
scores
url https://usn.ubuntu.com/2438-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8098
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jbua-ftmv-fygf
8
url VCID-mmwp-nchs-6bdh
vulnerability_id VCID-mmwp-nchs-6bdh
summary
Multiple vulnerabilities have been found in X.Org X Server, the
    worst of which may allow authenticated attackers to read from or send
    information to arbitrary X11 clients.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3418
reference_id
reference_type
scores
0
value 0.00497
scoring_system epss
scoring_elements 0.65766
published_at 2026-04-01T12:55:00Z
1
value 0.00497
scoring_system epss
scoring_elements 0.65816
published_at 2026-04-02T12:55:00Z
2
value 0.00497
scoring_system epss
scoring_elements 0.65846
published_at 2026-04-04T12:55:00Z
3
value 0.00497
scoring_system epss
scoring_elements 0.65812
published_at 2026-04-07T12:55:00Z
4
value 0.00497
scoring_system epss
scoring_elements 0.65864
published_at 2026-04-08T12:55:00Z
5
value 0.00497
scoring_system epss
scoring_elements 0.65876
published_at 2026-04-09T12:55:00Z
6
value 0.00497
scoring_system epss
scoring_elements 0.65894
published_at 2026-04-11T12:55:00Z
7
value 0.00497
scoring_system epss
scoring_elements 0.65882
published_at 2026-04-12T12:55:00Z
8
value 0.00497
scoring_system epss
scoring_elements 0.65852
published_at 2026-04-13T12:55:00Z
9
value 0.00497
scoring_system epss
scoring_elements 0.65887
published_at 2026-04-16T12:55:00Z
10
value 0.00497
scoring_system epss
scoring_elements 0.65902
published_at 2026-04-18T12:55:00Z
11
value 0.00497
scoring_system epss
scoring_elements 0.6589
published_at 2026-04-21T12:55:00Z
12
value 0.00497
scoring_system epss
scoring_elements 0.659
published_at 2026-04-24T12:55:00Z
13
value 0.00497
scoring_system epss
scoring_elements 0.65911
published_at 2026-04-26T12:55:00Z
14
value 0.00497
scoring_system epss
scoring_elements 0.65909
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1216020
reference_id 1216020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1216020
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308
reference_id 774308
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308
5
reference_url https://security.gentoo.org/glsa/201701-64
reference_id GLSA-201701-64
reference_type
scores
url https://security.gentoo.org/glsa/201701-64
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2015-3418
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmwp-nchs-6bdh
9
url VCID-sju7-ms24-wff1
vulnerability_id VCID-sju7-ms24-wff1
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
reference_id
reference_type
scores
url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8093
reference_id
reference_type
scores
0
value 0.01297
scoring_system epss
scoring_elements 0.79785
published_at 2026-04-29T12:55:00Z
1
value 0.01297
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-01T12:55:00Z
2
value 0.01297
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-02T12:55:00Z
3
value 0.01297
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-04T12:55:00Z
4
value 0.01297
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-07T12:55:00Z
5
value 0.01297
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-08T12:55:00Z
6
value 0.01297
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-09T12:55:00Z
7
value 0.01297
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-11T12:55:00Z
8
value 0.01297
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-12T12:55:00Z
9
value 0.01297
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-13T12:55:00Z
10
value 0.01297
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-16T12:55:00Z
11
value 0.01297
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-18T12:55:00Z
12
value 0.01297
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-21T12:55:00Z
13
value 0.01297
scoring_system epss
scoring_elements 0.79763
published_at 2026-04-24T12:55:00Z
14
value 0.01297
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8093
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
16
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
17
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
18
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71596
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71596
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168688
reference_id 1168688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168688
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8093
reference_id CVE-2014-8093
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8093
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8093
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sju7-ms24-wff1
10
url VCID-str7-xe4q-6fek
vulnerability_id VCID-str7-xe4q-6fek
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8099
reference_id
reference_type
scores
0
value 0.01337
scoring_system epss
scoring_elements 0.80071
published_at 2026-04-29T12:55:00Z
1
value 0.01337
scoring_system epss
scoring_elements 0.79943
published_at 2026-04-01T12:55:00Z
2
value 0.01337
scoring_system epss
scoring_elements 0.7995
published_at 2026-04-02T12:55:00Z
3
value 0.01337
scoring_system epss
scoring_elements 0.79971
published_at 2026-04-04T12:55:00Z
4
value 0.01337
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-07T12:55:00Z
5
value 0.01337
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-08T12:55:00Z
6
value 0.01337
scoring_system epss
scoring_elements 0.79996
published_at 2026-04-09T12:55:00Z
7
value 0.01337
scoring_system epss
scoring_elements 0.80016
published_at 2026-04-11T12:55:00Z
8
value 0.01337
scoring_system epss
scoring_elements 0.8
published_at 2026-04-12T12:55:00Z
9
value 0.01337
scoring_system epss
scoring_elements 0.79992
published_at 2026-04-13T12:55:00Z
10
value 0.01337
scoring_system epss
scoring_elements 0.80021
published_at 2026-04-18T12:55:00Z
11
value 0.01337
scoring_system epss
scoring_elements 0.80022
published_at 2026-04-21T12:55:00Z
12
value 0.01337
scoring_system epss
scoring_elements 0.8005
published_at 2026-04-24T12:55:00Z
13
value 0.01337
scoring_system epss
scoring_elements 0.80055
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8099
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.securityfocus.com/bid/71600
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71600
21
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168710
reference_id 1168710
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168710
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8099
reference_id CVE-2014-8099
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8099
27
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
28
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
29
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
30
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8099
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-str7-xe4q-6fek
11
url VCID-tame-fxrq-qfa7
vulnerability_id VCID-tame-fxrq-qfa7
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8091
reference_id
reference_type
scores
0
value 0.04839
scoring_system epss
scoring_elements 0.89555
published_at 2026-04-29T12:55:00Z
1
value 0.04839
scoring_system epss
scoring_elements 0.89488
published_at 2026-04-01T12:55:00Z
2
value 0.04839
scoring_system epss
scoring_elements 0.89492
published_at 2026-04-02T12:55:00Z
3
value 0.04839
scoring_system epss
scoring_elements 0.89503
published_at 2026-04-07T12:55:00Z
4
value 0.04839
scoring_system epss
scoring_elements 0.8952
published_at 2026-04-08T12:55:00Z
5
value 0.04839
scoring_system epss
scoring_elements 0.89523
published_at 2026-04-09T12:55:00Z
6
value 0.04839
scoring_system epss
scoring_elements 0.89531
published_at 2026-04-11T12:55:00Z
7
value 0.04839
scoring_system epss
scoring_elements 0.89528
published_at 2026-04-12T12:55:00Z
8
value 0.04839
scoring_system epss
scoring_elements 0.89524
published_at 2026-04-13T12:55:00Z
9
value 0.04839
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-16T12:55:00Z
10
value 0.04839
scoring_system epss
scoring_elements 0.89539
published_at 2026-04-18T12:55:00Z
11
value 0.04839
scoring_system epss
scoring_elements 0.89536
published_at 2026-04-21T12:55:00Z
12
value 0.04839
scoring_system epss
scoring_elements 0.89551
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8091
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71597
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71597
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168680
reference_id 1168680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168680
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8091
reference_id CVE-2014-8091
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8091
28
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
29
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
30
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
31
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
32
reference_url https://usn.ubuntu.com/2438-1/
reference_id USN-2438-1
reference_type
scores
url https://usn.ubuntu.com/2438-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8091
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tame-fxrq-qfa7
12
url VCID-tz65-cx8m-g3e5
vulnerability_id VCID-tz65-cx8m-g3e5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8103
reference_id
reference_type
scores
0
value 0.01787
scoring_system epss
scoring_elements 0.82815
published_at 2026-04-29T12:55:00Z
1
value 0.01787
scoring_system epss
scoring_elements 0.82669
published_at 2026-04-01T12:55:00Z
2
value 0.01787
scoring_system epss
scoring_elements 0.82685
published_at 2026-04-02T12:55:00Z
3
value 0.01787
scoring_system epss
scoring_elements 0.82699
published_at 2026-04-04T12:55:00Z
4
value 0.01787
scoring_system epss
scoring_elements 0.82695
published_at 2026-04-07T12:55:00Z
5
value 0.01787
scoring_system epss
scoring_elements 0.82721
published_at 2026-04-08T12:55:00Z
6
value 0.01787
scoring_system epss
scoring_elements 0.82728
published_at 2026-04-09T12:55:00Z
7
value 0.01787
scoring_system epss
scoring_elements 0.82744
published_at 2026-04-11T12:55:00Z
8
value 0.01787
scoring_system epss
scoring_elements 0.82739
published_at 2026-04-12T12:55:00Z
9
value 0.01787
scoring_system epss
scoring_elements 0.82735
published_at 2026-04-13T12:55:00Z
10
value 0.01787
scoring_system epss
scoring_elements 0.82774
published_at 2026-04-18T12:55:00Z
11
value 0.01787
scoring_system epss
scoring_elements 0.82778
published_at 2026-04-21T12:55:00Z
12
value 0.01787
scoring_system epss
scoring_elements 0.828
published_at 2026-04-24T12:55:00Z
13
value 0.01787
scoring_system epss
scoring_elements 0.82809
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
3
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
5
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168716
reference_id 1168716
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168716
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8103
reference_id CVE-2014-8103
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8103
23
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
24
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
25
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8103
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tz65-cx8m-g3e5
13
url VCID-v6yp-dquj-6bhh
vulnerability_id VCID-v6yp-dquj-6bhh
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8097
reference_id
reference_type
scores
0
value 0.01297
scoring_system epss
scoring_elements 0.79785
published_at 2026-04-29T12:55:00Z
1
value 0.01297
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-01T12:55:00Z
2
value 0.01297
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-02T12:55:00Z
3
value 0.01297
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-04T12:55:00Z
4
value 0.01297
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-07T12:55:00Z
5
value 0.01297
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-08T12:55:00Z
6
value 0.01297
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-09T12:55:00Z
7
value 0.01297
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-11T12:55:00Z
8
value 0.01297
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-12T12:55:00Z
9
value 0.01297
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-13T12:55:00Z
10
value 0.01297
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-16T12:55:00Z
11
value 0.01297
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-18T12:55:00Z
12
value 0.01297
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-21T12:55:00Z
13
value 0.01297
scoring_system epss
scoring_elements 0.79763
published_at 2026-04-24T12:55:00Z
14
value 0.01297
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71604
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71604
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168705
reference_id 1168705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168705
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8097
reference_id CVE-2014-8097
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8097
28
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
29
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
30
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
31
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8097
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6yp-dquj-6bhh
14
url VCID-vkq6-6h66-pubm
vulnerability_id VCID-vkq6-6h66-pubm
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8096
reference_id
reference_type
scores
0
value 0.01014
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-29T12:55:00Z
1
value 0.01014
scoring_system epss
scoring_elements 0.77083
published_at 2026-04-01T12:55:00Z
2
value 0.01014
scoring_system epss
scoring_elements 0.77089
published_at 2026-04-02T12:55:00Z
3
value 0.01014
scoring_system epss
scoring_elements 0.77118
published_at 2026-04-04T12:55:00Z
4
value 0.01014
scoring_system epss
scoring_elements 0.771
published_at 2026-04-07T12:55:00Z
5
value 0.01014
scoring_system epss
scoring_elements 0.77133
published_at 2026-04-08T12:55:00Z
6
value 0.01014
scoring_system epss
scoring_elements 0.77143
published_at 2026-04-09T12:55:00Z
7
value 0.01014
scoring_system epss
scoring_elements 0.7717
published_at 2026-04-11T12:55:00Z
8
value 0.01014
scoring_system epss
scoring_elements 0.77149
published_at 2026-04-12T12:55:00Z
9
value 0.01014
scoring_system epss
scoring_elements 0.77144
published_at 2026-04-13T12:55:00Z
10
value 0.01014
scoring_system epss
scoring_elements 0.77185
published_at 2026-04-16T12:55:00Z
11
value 0.01014
scoring_system epss
scoring_elements 0.77186
published_at 2026-04-18T12:55:00Z
12
value 0.01014
scoring_system epss
scoring_elements 0.77177
published_at 2026-04-21T12:55:00Z
13
value 0.01014
scoring_system epss
scoring_elements 0.77211
published_at 2026-04-24T12:55:00Z
14
value 0.01014
scoring_system epss
scoring_elements 0.77218
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8096
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71598
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71598
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168700
reference_id 1168700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168700
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8096
reference_id CVE-2014-8096
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8096
30
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
31
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
32
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
33
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8096
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkq6-6h66-pubm
15
url VCID-vzmd-vvau-wbf5
vulnerability_id VCID-vzmd-vvau-wbf5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8092
reference_id
reference_type
scores
0
value 0.01293
scoring_system epss
scoring_elements 0.79758
published_at 2026-04-29T12:55:00Z
1
value 0.01293
scoring_system epss
scoring_elements 0.79744
published_at 2026-04-26T12:55:00Z
2
value 0.01293
scoring_system epss
scoring_elements 0.79627
published_at 2026-04-01T12:55:00Z
3
value 0.01293
scoring_system epss
scoring_elements 0.79633
published_at 2026-04-02T12:55:00Z
4
value 0.01293
scoring_system epss
scoring_elements 0.79655
published_at 2026-04-04T12:55:00Z
5
value 0.01293
scoring_system epss
scoring_elements 0.79641
published_at 2026-04-07T12:55:00Z
6
value 0.01293
scoring_system epss
scoring_elements 0.7967
published_at 2026-04-08T12:55:00Z
7
value 0.01293
scoring_system epss
scoring_elements 0.79677
published_at 2026-04-09T12:55:00Z
8
value 0.01293
scoring_system epss
scoring_elements 0.79698
published_at 2026-04-11T12:55:00Z
9
value 0.01293
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-12T12:55:00Z
10
value 0.01293
scoring_system epss
scoring_elements 0.79675
published_at 2026-04-13T12:55:00Z
11
value 0.01293
scoring_system epss
scoring_elements 0.79703
published_at 2026-04-16T12:55:00Z
12
value 0.01293
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-18T12:55:00Z
13
value 0.01293
scoring_system epss
scoring_elements 0.79707
published_at 2026-04-21T12:55:00Z
14
value 0.01293
scoring_system epss
scoring_elements 0.79737
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8092
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
21
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
23
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
24
reference_url http://www.securityfocus.com/bid/71595
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71595
25
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168684
reference_id 1168684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168684
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8092
reference_id CVE-2014-8092
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8092
30
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
31
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
32
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
33
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2014-8092
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzmd-vvau-wbf5
16
url VCID-wjbk-4mjq-ybab
vulnerability_id VCID-wjbk-4mjq-ybab
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6424
reference_id
reference_type
scores
0
value 0.0684
scoring_system epss
scoring_elements 0.913
published_at 2026-04-01T12:55:00Z
1
value 0.0684
scoring_system epss
scoring_elements 0.91305
published_at 2026-04-02T12:55:00Z
2
value 0.0684
scoring_system epss
scoring_elements 0.91315
published_at 2026-04-04T12:55:00Z
3
value 0.0684
scoring_system epss
scoring_elements 0.91322
published_at 2026-04-07T12:55:00Z
4
value 0.0684
scoring_system epss
scoring_elements 0.91335
published_at 2026-04-08T12:55:00Z
5
value 0.0684
scoring_system epss
scoring_elements 0.9134
published_at 2026-04-09T12:55:00Z
6
value 0.0684
scoring_system epss
scoring_elements 0.91347
published_at 2026-04-11T12:55:00Z
7
value 0.0684
scoring_system epss
scoring_elements 0.9135
published_at 2026-04-13T12:55:00Z
8
value 0.0684
scoring_system epss
scoring_elements 0.91375
published_at 2026-04-21T12:55:00Z
9
value 0.0684
scoring_system epss
scoring_elements 0.91373
published_at 2026-04-18T12:55:00Z
10
value 0.0684
scoring_system epss
scoring_elements 0.91384
published_at 2026-04-24T12:55:00Z
11
value 0.0684
scoring_system epss
scoring_elements 0.91383
published_at 2026-04-26T12:55:00Z
12
value 0.0684
scoring_system epss
scoring_elements 0.91382
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1037984
reference_id 1037984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1037984
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922
reference_id 742922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922
5
reference_url https://security.gentoo.org/glsa/201701-64
reference_id GLSA-201701-64
reference_type
scores
url https://security.gentoo.org/glsa/201701-64
6
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
7
reference_url https://access.redhat.com/errata/RHSA-2013:1868
reference_id RHSA-2013:1868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1868
8
reference_url https://usn.ubuntu.com/2500-1/
reference_id USN-2500-1
reference_type
scores
url https://usn.ubuntu.com/2500-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
purl pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-42nu-8tap-5fbj
13
vulnerability VCID-44yr-b94s-nfd5
14
vulnerability VCID-49m7-vqbk-s3ce
15
vulnerability VCID-4ngr-6ccu-r7fv
16
vulnerability VCID-4phf-c3vm-23db
17
vulnerability VCID-515f-a8yj-4fej
18
vulnerability VCID-537j-hg6y-jbgb
19
vulnerability VCID-5awx-j7z7-qyak
20
vulnerability VCID-5gza-pvdd-zycf
21
vulnerability VCID-62fw-zp51-gyhw
22
vulnerability VCID-68t6-6w3n-jffa
23
vulnerability VCID-6hwh-7tvr-sqgn
24
vulnerability VCID-6qsh-kaxk-zuf9
25
vulnerability VCID-6rcq-qxef-nuf7
26
vulnerability VCID-7nax-5yw9-eye8
27
vulnerability VCID-7r23-ad57-yydp
28
vulnerability VCID-954x-c1x3-67gg
29
vulnerability VCID-9cjy-6fj5-r7ag
30
vulnerability VCID-a4bk-m98g-93f8
31
vulnerability VCID-agtx-nbcj-jufj
32
vulnerability VCID-bv8h-xa48-hbh7
33
vulnerability VCID-bvay-s9w4-muf8
34
vulnerability VCID-c81n-kx59-q7h5
35
vulnerability VCID-c9vv-1x48-9uej
36
vulnerability VCID-cfjq-38mk-hbhf
37
vulnerability VCID-dcdh-w9a1-wfff
38
vulnerability VCID-e7w3-3hpm-hbec
39
vulnerability VCID-e9px-edn1-tufs
40
vulnerability VCID-ebqr-xztt-y3bj
41
vulnerability VCID-em7x-adw1-tyaz
42
vulnerability VCID-fcac-qzvs-rfa8
43
vulnerability VCID-fgnr-h7rm-83d4
44
vulnerability VCID-fpny-yp5d-zbcu
45
vulnerability VCID-h242-94ba-ykcb
46
vulnerability VCID-hhnr-av5b-t7dc
47
vulnerability VCID-hkrr-v71f-xqdb
48
vulnerability VCID-hsa9-8jn1-jyhr
49
vulnerability VCID-hzj2-b4e4-ubf6
50
vulnerability VCID-j6qd-r6ua-cfbm
51
vulnerability VCID-jbua-ftmv-fygf
52
vulnerability VCID-jrx7-pbf3-h3at
53
vulnerability VCID-juet-bb4m-hkhq
54
vulnerability VCID-jvgv-d94j-mqa1
55
vulnerability VCID-m2hp-k4c4-m3db
56
vulnerability VCID-mmwp-nchs-6bdh
57
vulnerability VCID-n95v-qmcg-6bek
58
vulnerability VCID-nbdz-scr3-hbhv
59
vulnerability VCID-p1tf-2c6u-tygr
60
vulnerability VCID-pcn1-ehd2-g3f7
61
vulnerability VCID-phkz-t2yr-m7em
62
vulnerability VCID-psr2-gkpa-z7fj
63
vulnerability VCID-q8jj-uwq7-qubk
64
vulnerability VCID-qwqu-19wq-1ke8
65
vulnerability VCID-s7xs-zcxk-nyc7
66
vulnerability VCID-sfgy-e6d6-f3fd
67
vulnerability VCID-sju7-ms24-wff1
68
vulnerability VCID-str7-xe4q-6fek
69
vulnerability VCID-sx54-5s5r-ckg2
70
vulnerability VCID-t1cy-srre-nkbp
71
vulnerability VCID-tame-fxrq-qfa7
72
vulnerability VCID-tngq-27px-w7cm
73
vulnerability VCID-trsp-u7xt-a3ck
74
vulnerability VCID-tz65-cx8m-g3e5
75
vulnerability VCID-un9v-4svv-2baj
76
vulnerability VCID-uxsy-k3cg-mkdd
77
vulnerability VCID-v2jb-vhek-fkcz
78
vulnerability VCID-v6yp-dquj-6bhh
79
vulnerability VCID-v8w1-zu65-c7ac
80
vulnerability VCID-v9p1-8sb6-9ufr
81
vulnerability VCID-vkq6-6h66-pubm
82
vulnerability VCID-vzmd-vvau-wbf5
83
vulnerability VCID-wh9v-35ju-vbcb
84
vulnerability VCID-wjbk-4mjq-ybab
85
vulnerability VCID-wp8b-r6p1-7kcf
86
vulnerability VCID-wq4p-h17p-fyf4
87
vulnerability VCID-wyuw-13t9-rbg1
88
vulnerability VCID-x3p6-a59z-ebf3
89
vulnerability VCID-xk4b-12p1-ckam
90
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6
1
url pkg:deb/debian/xorg-server@2:1.16.4-1
purl pkg:deb/debian/xorg-server@2:1.16.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1742-kcnn-pyg5
1
vulnerability VCID-1cjg-y5qm-sffh
2
vulnerability VCID-1pcv-f5h3-9fe9
3
vulnerability VCID-1xa1-uf4t-z3bs
4
vulnerability VCID-28er-gwh3-rugq
5
vulnerability VCID-2cp3-p3yx-17be
6
vulnerability VCID-2vrb-n6cc-c7bc
7
vulnerability VCID-36vg-vekq-vbhj
8
vulnerability VCID-37e1-pzxj-2fdt
9
vulnerability VCID-3aj3-ufnq-13f3
10
vulnerability VCID-3q8e-92u3-sufy
11
vulnerability VCID-41cd-s77z-6bcc
12
vulnerability VCID-44yr-b94s-nfd5
13
vulnerability VCID-49m7-vqbk-s3ce
14
vulnerability VCID-4ngr-6ccu-r7fv
15
vulnerability VCID-515f-a8yj-4fej
16
vulnerability VCID-5awx-j7z7-qyak
17
vulnerability VCID-62fw-zp51-gyhw
18
vulnerability VCID-68t6-6w3n-jffa
19
vulnerability VCID-6hwh-7tvr-sqgn
20
vulnerability VCID-6qsh-kaxk-zuf9
21
vulnerability VCID-6rcq-qxef-nuf7
22
vulnerability VCID-7nax-5yw9-eye8
23
vulnerability VCID-7r23-ad57-yydp
24
vulnerability VCID-954x-c1x3-67gg
25
vulnerability VCID-9cjy-6fj5-r7ag
26
vulnerability VCID-a4bk-m98g-93f8
27
vulnerability VCID-bv8h-xa48-hbh7
28
vulnerability VCID-bvay-s9w4-muf8
29
vulnerability VCID-c81n-kx59-q7h5
30
vulnerability VCID-cfjq-38mk-hbhf
31
vulnerability VCID-dcdh-w9a1-wfff
32
vulnerability VCID-e7w3-3hpm-hbec
33
vulnerability VCID-e9px-edn1-tufs
34
vulnerability VCID-ebqr-xztt-y3bj
35
vulnerability VCID-em7x-adw1-tyaz
36
vulnerability VCID-fcac-qzvs-rfa8
37
vulnerability VCID-fgnr-h7rm-83d4
38
vulnerability VCID-fpny-yp5d-zbcu
39
vulnerability VCID-h242-94ba-ykcb
40
vulnerability VCID-hhnr-av5b-t7dc
41
vulnerability VCID-hkrr-v71f-xqdb
42
vulnerability VCID-hzj2-b4e4-ubf6
43
vulnerability VCID-j6qd-r6ua-cfbm
44
vulnerability VCID-jrx7-pbf3-h3at
45
vulnerability VCID-juet-bb4m-hkhq
46
vulnerability VCID-jvgv-d94j-mqa1
47
vulnerability VCID-m2hp-k4c4-m3db
48
vulnerability VCID-n95v-qmcg-6bek
49
vulnerability VCID-nbdz-scr3-hbhv
50
vulnerability VCID-p1tf-2c6u-tygr
51
vulnerability VCID-pcn1-ehd2-g3f7
52
vulnerability VCID-phkz-t2yr-m7em
53
vulnerability VCID-psr2-gkpa-z7fj
54
vulnerability VCID-q8jj-uwq7-qubk
55
vulnerability VCID-qwqu-19wq-1ke8
56
vulnerability VCID-s7xs-zcxk-nyc7
57
vulnerability VCID-sfgy-e6d6-f3fd
58
vulnerability VCID-sx54-5s5r-ckg2
59
vulnerability VCID-t1cy-srre-nkbp
60
vulnerability VCID-tngq-27px-w7cm
61
vulnerability VCID-trsp-u7xt-a3ck
62
vulnerability VCID-un9v-4svv-2baj
63
vulnerability VCID-uxsy-k3cg-mkdd
64
vulnerability VCID-v2jb-vhek-fkcz
65
vulnerability VCID-v8w1-zu65-c7ac
66
vulnerability VCID-v9p1-8sb6-9ufr
67
vulnerability VCID-wh9v-35ju-vbcb
68
vulnerability VCID-wp8b-r6p1-7kcf
69
vulnerability VCID-wq4p-h17p-fyf4
70
vulnerability VCID-wyuw-13t9-rbg1
71
vulnerability VCID-x3p6-a59z-ebf3
72
vulnerability VCID-xk4b-12p1-ckam
73
vulnerability VCID-zhdy-8stm-q3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1
aliases CVE-2013-6424
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjbk-4mjq-ybab
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1