{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","type":"deb","namespace":"debian","name":"xorg-server","version":"2:1.16.4-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2:21.1.7-3+deb12u12","latest_non_vulnerable_version":"2:21.1.22-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32174?format=json","vulnerability_id":"VCID-1742-kcnn-pyg5","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46152","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46084","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142","reference_id":"1869142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2020-14361"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1742-kcnn-pyg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46286?format=json","vulnerability_id":"VCID-1cjg-y5qm-sffh","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4008","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22471","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026059","reference_id":"2026059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026059"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"},{"reference_url":"https://usn.ubuntu.com/5193-2/","reference_id":"USN-5193-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-2/"},{"reference_url":"https://usn.ubuntu.com/5193-3/","reference_id":"USN-5193-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2021-4008"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjg-y5qm-sffh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59264?format=json","vulnerability_id":"VCID-1pcv-f5h3-9fe9","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26595","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345257","reference_id":"2345257","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345257"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26595","reference_id":"CVE-2025-26595","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26595"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26595"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pcv-f5h3-9fe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39717?format=json","vulnerability_id":"VCID-1xa1-uf4t-z3bs","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12177","reference_id":"","reference_type":"","scores":[{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.7645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76411","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509218","reference_id":"1509218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509218"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12177"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xa1-uf4t-z3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46300?format=json","vulnerability_id":"VCID-28er-gwh3-rugq","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46342","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33989","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34059","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35225","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34924","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151757","reference_id":"2151757","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-46342","reference_id":"CVE-2022-46342","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-46342"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-46342"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69421?format=json","vulnerability_id":"VCID-2cp3-p3yx-17be","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49180","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31292","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.3112","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3612","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369981","reference_id":"2369981","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369981"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6","reference_id":"3c3a4b767b16174d3213055947ea7f4f88e10ec6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49180","reference_id":"CVE-2025-49180","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-49180"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cp3-p3yx-17be"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69419?format=json","vulnerability_id":"VCID-2vrb-n6cc-c7bc","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49178","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21881","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21741","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4076","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41056","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41027","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4095","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40844","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369977","reference_id":"2369977","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369977"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49178","reference_id":"CVE-2025-49178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49178"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2","reference_id":"d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-49178"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vrb-n6cc-c7bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39743?format=json","vulnerability_id":"VCID-36vg-vekq-vbhj","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12183","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509224","reference_id":"1509224","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509224"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12183"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36vg-vekq-vbhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59267?format=json","vulnerability_id":"VCID-37e1-pzxj-2fdt","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26598","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06135","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06123","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08866","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09209","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20528","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345254","reference_id":"2345254","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345254"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26598","reference_id":"CVE-2025-26598","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26598"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26598"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37e1-pzxj-2fdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63878?format=json","vulnerability_id":"VCID-3aj3-ufnq-13f3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12184","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509225","reference_id":"1509225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509225"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12184"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3aj3-ufnq-13f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39725?format=json","vulnerability_id":"VCID-3q8e-92u3-sufy","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12179","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509220","reference_id":"1509220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509220"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12179"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3q8e-92u3-sufy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59265?format=json","vulnerability_id":"VCID-41cd-s77z-6bcc","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26596","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345256","reference_id":"2345256","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345256"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26596","reference_id":"CVE-2025-26596","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26596"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26596"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-41cd-s77z-6bcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46298?format=json","vulnerability_id":"VCID-44yr-b94s-nfd5","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46340","reference_id":"","reference_type":"","scores":[{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78293","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78988","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151755","reference_id":"2151755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151755"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-46340"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32170?format=json","vulnerability_id":"VCID-49m7-vqbk-s3ce","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29159","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241","reference_id":"1862241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"},{"reference_url":"https://usn.ubuntu.com/4490-1/","reference_id":"USN-4490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4490-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2020-14345"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49m7-vqbk-s3ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41834?format=json","vulnerability_id":"VCID-4ngr-6ccu-r7fv","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31083","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26069","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2612","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27884","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27893","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27841","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272000","reference_id":"2272000","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272000"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31083","reference_id":"CVE-2024-31083","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31083"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1785","reference_id":"RHSA-2024:1785","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2036","reference_id":"RHSA-2024:2036","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2037","reference_id":"RHSA-2024:2037","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2038","reference_id":"RHSA-2024:2038","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2039","reference_id":"RHSA-2024:2039","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2040","reference_id":"RHSA-2024:2040","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2041","reference_id":"RHSA-2024:2041","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2042","reference_id":"RHSA-2024:2042","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2080","reference_id":"RHSA-2024:2080","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2616","reference_id":"RHSA-2024:2616","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3258","reference_id":"RHSA-2024:3258","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3261","reference_id":"RHSA-2024:3261","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3343","reference_id":"RHSA-2024:3343","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9093","reference_id":"RHSA-2024:9093","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9122","reference_id":"RHSA-2024:9122","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-31083"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ngr-6ccu-r7fv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59271?format=json","vulnerability_id":"VCID-515f-a8yj-4fej","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26600","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345252","reference_id":"2345252","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345252"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26600","reference_id":"CVE-2025-26600","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26600"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26600"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-515f-a8yj-4fej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49329?format=json","vulnerability_id":"VCID-5awx-j7z7-qyak","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0408","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04147","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04271","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06484","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06496","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257689","reference_id":"2257689","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257689"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0408","reference_id":"CVE-2024-0408","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0408"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-0408"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5awx-j7z7-qyak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63779?format=json","vulnerability_id":"VCID-62fw-zp51-gyhw","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10971","reference_id":"","reference_type":"","scores":[{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.8558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.8567","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.857","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473204","reference_id":"1473204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473204"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492","reference_id":"867492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492"},{"reference_url":"https://security.archlinux.org/ASA-201708-11","reference_id":"ASA-201708-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-11"},{"reference_url":"https://security.archlinux.org/AVG-341","reference_id":"AVG-341","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-341"},{"reference_url":"https://usn.ubuntu.com/3362-1/","reference_id":"USN-3362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3362-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-10971"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-62fw-zp51-gyhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49324?format=json","vulnerability_id":"VCID-68t6-6w3n-jffa","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5380","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22401","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22413","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22403","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24043","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2406","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24149","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244736","reference_id":"2244736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244736"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7428","reference_id":"RHSA-2023:7428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2298","reference_id":"RHSA-2024:2298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3067","reference_id":"RHSA-2024:3067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3067"},{"reference_url":"https://usn.ubuntu.com/6453-1/","reference_id":"USN-6453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-1/"},{"reference_url":"https://usn.ubuntu.com/6453-2/","reference_id":"USN-6453-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2023-5380"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68t6-6w3n-jffa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59266?format=json","vulnerability_id":"VCID-6hwh-7tvr-sqgn","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26597","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345255","reference_id":"2345255","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345255"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26597","reference_id":"CVE-2025-26597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26597"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26597"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6hwh-7tvr-sqgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46290?format=json","vulnerability_id":"VCID-6qsh-kaxk-zuf9","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4011","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12368","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12518","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12404","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12381","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12282","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026074","reference_id":"2026074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026074"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"},{"reference_url":"https://usn.ubuntu.com/5193-2/","reference_id":"USN-5193-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-2/"},{"reference_url":"https://usn.ubuntu.com/5193-3/","reference_id":"USN-5193-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2021-4011"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qsh-kaxk-zuf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49328?format=json","vulnerability_id":"VCID-6rcq-qxef-nuf7","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0229","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52842","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52821","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55137","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5512","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256690","reference_id":"2256690","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0229","reference_id":"CVE-2024-0229","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0229"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-0229"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcq-qxef-nuf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59269?format=json","vulnerability_id":"VCID-7nax-5yw9-eye8","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26599","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345253","reference_id":"2345253","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345253"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26599","reference_id":"CVE-2025-26599","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26599"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26599"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7nax-5yw9-eye8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41474?format=json","vulnerability_id":"VCID-7r23-ad57-yydp","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13721","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24582","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24727","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24719","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2468","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24808","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24711","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13721"},{"reference_url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1","reference_id":"","reference_type":"","scores":[],"url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:C"},{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4000"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/10/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/10/04/10"},{"reference_url":"http://www.securityfocus.com/bid/101238","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101238"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500387","reference_id":"1500387","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500387"},{"reference_url":"https://security.archlinux.org/ASA-201710-10","reference_id":"ASA-201710-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-10"},{"reference_url":"https://security.archlinux.org/AVG-432","reference_id":"AVG-432","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-432"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13721","reference_id":"CVE-2017-13721","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13721"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://usn.ubuntu.com/3453-1/","reference_id":"USN-3453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-13721"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7r23-ad57-yydp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63780?format=json","vulnerability_id":"VCID-954x-c1x3-67gg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10972","reference_id":"","reference_type":"","scores":[{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68207","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68292","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.6834","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473205","reference_id":"1473205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473205"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492","reference_id":"867492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492"},{"reference_url":"https://security.archlinux.org/ASA-201708-11","reference_id":"ASA-201708-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-11"},{"reference_url":"https://security.archlinux.org/AVG-341","reference_id":"AVG-341","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-341"},{"reference_url":"https://usn.ubuntu.com/3362-1/","reference_id":"USN-3362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3362-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-10972"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-954x-c1x3-67gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41832?format=json","vulnerability_id":"VCID-9cjy-6fj5-r7ag","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31081","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31424","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31456","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271998","reference_id":"2271998","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271998"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31081","reference_id":"CVE-2024-31081","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31081"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1785","reference_id":"RHSA-2024:1785","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2036","reference_id":"RHSA-2024:2036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2037","reference_id":"RHSA-2024:2037","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2038","reference_id":"RHSA-2024:2038","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2039","reference_id":"RHSA-2024:2039","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2040","reference_id":"RHSA-2024:2040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2041","reference_id":"RHSA-2024:2041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2042","reference_id":"RHSA-2024:2042","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2080","reference_id":"RHSA-2024:2080","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2616","reference_id":"RHSA-2024:2616","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3258","reference_id":"RHSA-2024:3258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3261","reference_id":"RHSA-2024:3261","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3343","reference_id":"RHSA-2024:3343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9093","reference_id":"RHSA-2024:9093","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9122","reference_id":"RHSA-2024:9122","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-31081"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9cjy-6fj5-r7ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46302?format=json","vulnerability_id":"VCID-a4bk-m98g-93f8","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46344","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75742","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75772","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76622","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.7661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76648","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151760","reference_id":"2151760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151760"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-46344"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51244?format=json","vulnerability_id":"VCID-bv8h-xa48-hbh7","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2319","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10182","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10349","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10138","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10269","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903","reference_id":"1014903","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106671","reference_id":"2106671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106671"},{"reference_url":"https://security.archlinux.org/AVG-2770","reference_id":"AVG-2770","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2770"},{"reference_url":"https://security.gentoo.org/glsa/202210-30","reference_id":"GLSA-202210-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5905","reference_id":"RHSA-2022:5905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7583","reference_id":"RHSA-2022:7583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8221","reference_id":"RHSA-2022:8221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8222","reference_id":"RHSA-2022:8222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8222"},{"reference_url":"https://usn.ubuntu.com/5510-1/","reference_id":"USN-5510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-1/"},{"reference_url":"https://usn.ubuntu.com/5510-2/","reference_id":"USN-5510-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-2319"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bv8h-xa48-hbh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46294?format=json","vulnerability_id":"VCID-bvay-s9w4-muf8","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3551","reference_id":"","reference_type":"","scores":[{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73165","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73201","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73213","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140701","reference_id":"2140701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140701"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8491","reference_id":"RHSA-2022:8491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://usn.ubuntu.com/5740-1/","reference_id":"USN-5740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5740-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-3551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvay-s9w4-muf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39730?format=json","vulnerability_id":"VCID-c81n-kx59-q7h5","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12180","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509221","reference_id":"1509221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509221"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12180"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c81n-kx59-q7h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39735?format=json","vulnerability_id":"VCID-cfjq-38mk-hbhf","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12181","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509222","reference_id":"1509222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509222"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12181"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfjq-38mk-hbhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63879?format=json","vulnerability_id":"VCID-dcdh-w9a1-wfff","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12185","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509215","reference_id":"1509215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509215"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcdh-w9a1-wfff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46297?format=json","vulnerability_id":"VCID-e7w3-3hpm-hbec","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4283","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39135","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40375","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40362","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151761","reference_id":"2151761","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151761"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-4283","reference_id":"CVE-2022-4283","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-4283"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-4283"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66662?format=json","vulnerability_id":"VCID-e9px-edn1-tufs","summary":"xorg: xmayland: Use-after-free in XPresentNotify structure creation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62229","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0264","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02716","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html","reference_id":"003635.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402649","reference_id":"2402649","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402649"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-62229","reference_id":"CVE-2025-62229","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-62229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19432","reference_id":"RHSA-2025:19432","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19433","reference_id":"RHSA-2025:19433","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19434","reference_id":"RHSA-2025:19434","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19435","reference_id":"RHSA-2025:19435","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19489","reference_id":"RHSA-2025:19489","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19623","reference_id":"RHSA-2025:19623","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19909","reference_id":"RHSA-2025:19909","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20958","reference_id":"RHSA-2025:20958","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20960","reference_id":"RHSA-2025:20960","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20961","reference_id":"RHSA-2025:20961","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21035","reference_id":"RHSA-2025:21035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22040","reference_id":"RHSA-2025:22040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22041","reference_id":"RHSA-2025:22041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22051","reference_id":"RHSA-2025:22051","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22055","reference_id":"RHSA-2025:22055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22056","reference_id":"RHSA-2025:22056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22077","reference_id":"RHSA-2025:22077","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22096","reference_id":"RHSA-2025:22096","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22164","reference_id":"RHSA-2025:22164","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22167","reference_id":"RHSA-2025:22167","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22364","reference_id":"RHSA-2025:22364","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22365","reference_id":"RHSA-2025:22365","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22426","reference_id":"RHSA-2025:22426","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22427","reference_id":"RHSA-2025:22427","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22667","reference_id":"RHSA-2025:22667","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22729","reference_id":"RHSA-2025:22729","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22742","reference_id":"RHSA-2025:22742","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22753","reference_id":"RHSA-2025:22753","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0031","reference_id":"RHSA-2026:0031","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0033","reference_id":"RHSA-2026:0033","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0034","reference_id":"RHSA-2026:0034","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0035","reference_id":"RHSA-2026:0035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0036","reference_id":"RHSA-2026:0036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0036"},{"reference_url":"https://usn.ubuntu.com/7846-1/","reference_id":"USN-7846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-62229"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9px-edn1-tufs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63881?format=json","vulnerability_id":"VCID-ebqr-xztt-y3bj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12187","reference_id":"","reference_type":"","scores":[{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73662","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73557","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73529","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73619","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.7362","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509217","reference_id":"1509217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509217"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12187"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebqr-xztt-y3bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51245?format=json","vulnerability_id":"VCID-em7x-adw1-tyaz","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2320","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18358","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18543","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18499","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18471","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903","reference_id":"1014903","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106683","reference_id":"2106683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106683"},{"reference_url":"https://security.archlinux.org/AVG-2770","reference_id":"AVG-2770","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2770"},{"reference_url":"https://security.gentoo.org/glsa/202210-30","reference_id":"GLSA-202210-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5905","reference_id":"RHSA-2022:5905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7583","reference_id":"RHSA-2022:7583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8221","reference_id":"RHSA-2022:8221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8222","reference_id":"RHSA-2022:8222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8222"},{"reference_url":"https://usn.ubuntu.com/5510-1/","reference_id":"USN-5510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-1/"},{"reference_url":"https://usn.ubuntu.com/5510-2/","reference_id":"USN-5510-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-2320"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-em7x-adw1-tyaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46289?format=json","vulnerability_id":"VCID-fcac-qzvs-rfa8","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4010","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23318","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23145","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23355","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23375","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026073","reference_id":"2026073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026073"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2021-4010"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcac-qzvs-rfa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49330?format=json","vulnerability_id":"VCID-fgnr-h7rm-83d4","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0409","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03005","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04852","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0482","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257690","reference_id":"2257690","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0409","reference_id":"CVE-2024-0409","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0409"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-0409"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fgnr-h7rm-83d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39739?format=json","vulnerability_id":"VCID-fpny-yp5d-zbcu","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12182","reference_id":"","reference_type":"","scores":[{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.7645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76396","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509223","reference_id":"1509223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509223"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12182"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpny-yp5d-zbcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41696?format=json","vulnerability_id":"VCID-h242-94ba-ykcb","summary":"Multiple vulnerabilities have been found in X.Org X Server, the\n    worst of which may allow authenticated attackers to read from or send\n    information to arbitrary X11 clients.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3164","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20267","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20201","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20046","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1219548","reference_id":"1219548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1219548"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410","reference_id":"788410","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410"},{"reference_url":"https://security.gentoo.org/glsa/201701-64","reference_id":"GLSA-201701-64","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-64"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"}],"aliases":["CVE-2015-3164"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h242-94ba-ykcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32176?format=json","vulnerability_id":"VCID-hhnr-av5b-t7dc","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39028","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144","reference_id":"1869144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2020-14362"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhnr-av5b-t7dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59273?format=json","vulnerability_id":"VCID-hkrr-v71f-xqdb","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26601","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345251","reference_id":"2345251","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345251"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26601","reference_id":"CVE-2025-26601","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26601"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26601"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hkrr-v71f-xqdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50769?format=json","vulnerability_id":"VCID-hzj2-b4e4-ubf6","summary":"A vulnerability in X.Org X Server may allow users to escalate\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3472","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26016","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.261","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25973","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25918","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944167","reference_id":"1944167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944167"},{"reference_url":"https://security.archlinux.org/AVG-1811","reference_id":"AVG-1811","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1811"},{"reference_url":"https://security.archlinux.org/AVG-1812","reference_id":"AVG-1812","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1812"},{"reference_url":"https://security.gentoo.org/glsa/202104-02","reference_id":"GLSA-202104-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2033","reference_id":"RHSA-2021:2033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2033"},{"reference_url":"https://usn.ubuntu.com/4905-1/","reference_id":"USN-4905-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4905-1/"},{"reference_url":"https://usn.ubuntu.com/4905-2/","reference_id":"USN-4905-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4905-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2021-3472"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hzj2-b4e4-ubf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49332?format=json","vulnerability_id":"VCID-j6qd-r6ua-cfbm","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21886","reference_id":"","reference_type":"","scores":[{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.4698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49293","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49296","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256542","reference_id":"2256542","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256542"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-21886","reference_id":"CVE-2024-21886","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-21886"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-21886"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6qd-r6ua-cfbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46299?format=json","vulnerability_id":"VCID-jrx7-pbf3-h3at","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46341","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7881","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151756","reference_id":"2151756","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151756"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-46341","reference_id":"CVE-2022-46341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-46341"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-46341"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41830?format=json","vulnerability_id":"VCID-juet-bb4m-hkhq","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9632","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17648","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17692","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18045","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17759","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17769","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244","reference_id":"1086244","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245","reference_id":"1086245","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317233","reference_id":"2317233","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317233"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-9632","reference_id":"CVE-2024-9632","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-9632"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10090","reference_id":"RHSA-2024:10090","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:10090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8798","reference_id":"RHSA-2024:8798","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:8798"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9540","reference_id":"RHSA-2024:9540","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9579","reference_id":"RHSA-2024:9579","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9601","reference_id":"RHSA-2024:9601","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9690","reference_id":"RHSA-2024:9690","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9816","reference_id":"RHSA-2024:9816","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9818","reference_id":"RHSA-2024:9818","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9819","reference_id":"RHSA-2024:9819","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9820","reference_id":"RHSA-2024:9820","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9901","reference_id":"RHSA-2024:9901","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7085-1/","reference_id":"USN-7085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7085-1/"},{"reference_url":"https://usn.ubuntu.com/7085-2/","reference_id":"USN-7085-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7085-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2024-9632"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-juet-bb4m-hkhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39720?format=json","vulnerability_id":"VCID-jvgv-d94j-mqa1","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12178","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509219","reference_id":"1509219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509219"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12178"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvgv-d94j-mqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46292?format=json","vulnerability_id":"VCID-m2hp-k4c4-m3db","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3550","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61464","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61485","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.6148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61479","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140698","reference_id":"2140698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140698"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8491","reference_id":"RHSA-2022:8491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://usn.ubuntu.com/5740-1/","reference_id":"USN-5740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5740-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-3550"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2hp-k4c4-m3db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32172?format=json","vulnerability_id":"VCID-n95v-qmcg-6bek","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18216","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18369","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258","reference_id":"1862258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986","reference_id":"968986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986"},{"reference_url":"https://security.archlinux.org/AVG-1211","reference_id":"AVG-1211","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1211"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2020-14347"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n95v-qmcg-6bek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39712?format=json","vulnerability_id":"VCID-nbdz-scr3-hbhv","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12176","reference_id":"","reference_type":"","scores":[{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.7645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76411","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509214","reference_id":"1509214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509214"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12176"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nbdz-scr3-hbhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41831?format=json","vulnerability_id":"VCID-p1tf-2c6u-tygr","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31080","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31424","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31456","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271997","reference_id":"2271997","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271997"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31080","reference_id":"CVE-2024-31080","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31080"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1785","reference_id":"RHSA-2024:1785","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2036","reference_id":"RHSA-2024:2036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2037","reference_id":"RHSA-2024:2037","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2038","reference_id":"RHSA-2024:2038","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2039","reference_id":"RHSA-2024:2039","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2040","reference_id":"RHSA-2024:2040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2041","reference_id":"RHSA-2024:2041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2042","reference_id":"RHSA-2024:2042","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2080","reference_id":"RHSA-2024:2080","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2616","reference_id":"RHSA-2024:2616","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3258","reference_id":"RHSA-2024:3258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3261","reference_id":"RHSA-2024:3261","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3343","reference_id":"RHSA-2024:3343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9093","reference_id":"RHSA-2024:9093","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9122","reference_id":"RHSA-2024:9122","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-31080"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p1tf-2c6u-tygr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32171?format=json","vulnerability_id":"VCID-pcn1-ehd2-g3f7","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38073","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37678","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246","reference_id":"1862246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2020-14346"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcn1-ehd2-g3f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49327?format=json","vulnerability_id":"VCID-phkz-t2yr-m7em","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6816","reference_id":"","reference_type":"","scores":[{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87156","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87167","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257691","reference_id":"2257691","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257691"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-6816","reference_id":"CVE-2023-6816","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-6816"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2023-6816"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-phkz-t2yr-m7em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32173?format=json","vulnerability_id":"VCID-psr2-gkpa-z7fj","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28417","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28343","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139","reference_id":"1869139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2020-14360"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psr2-gkpa-z7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41477?format=json","vulnerability_id":"VCID-q8jj-uwq7-qubk","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2624","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14333","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14418","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14485","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14337","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14173","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1417","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14241","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1424984","reference_id":"1424984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1424984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398","reference_id":"856398","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398"},{"reference_url":"https://security.gentoo.org/glsa/201704-03","reference_id":"GLSA-201704-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-03"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://usn.ubuntu.com/3362-1/","reference_id":"USN-3362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3362-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"}],"aliases":["CVE-2017-2624"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8jj-uwq7-qubk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59262?format=json","vulnerability_id":"VCID-qwqu-19wq-1ke8","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26594","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345248","reference_id":"2345248","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345248"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26594","reference_id":"CVE-2025-26594","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26594"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-26594"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqu-19wq-1ke8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69420?format=json","vulnerability_id":"VCID-s7xs-zcxk-nyc7","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49179","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3612","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3582","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35787","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369978","reference_id":"2369978","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369978"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4","reference_id":"2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49179","reference_id":"CVE-2025-49179","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-49179"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s7xs-zcxk-nyc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69416?format=json","vulnerability_id":"VCID-sfgy-e6d6-f3fd","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49175","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2423","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38891","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44904","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee","reference_id":"0885e0b26225c90534642fe911632ec0779eebee","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024","reference_id":"2024","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369947","reference_id":"2369947","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369947"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49175","reference_id":"CVE-2025-49175","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-49175"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sfgy-e6d6-f3fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66663?format=json","vulnerability_id":"VCID-sx54-5s5r-ckg2","summary":"xorg: xwayland: Use-after-free in Xkb client resource removal","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62230","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01913","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01982","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0089","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00892","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00895","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00898","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html","reference_id":"003635.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402653","reference_id":"2402653","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402653"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-62230","reference_id":"CVE-2025-62230","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-62230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19432","reference_id":"RHSA-2025:19432","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19433","reference_id":"RHSA-2025:19433","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19434","reference_id":"RHSA-2025:19434","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19435","reference_id":"RHSA-2025:19435","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19489","reference_id":"RHSA-2025:19489","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19623","reference_id":"RHSA-2025:19623","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19909","reference_id":"RHSA-2025:19909","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20958","reference_id":"RHSA-2025:20958","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20960","reference_id":"RHSA-2025:20960","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20961","reference_id":"RHSA-2025:20961","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21035","reference_id":"RHSA-2025:21035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22040","reference_id":"RHSA-2025:22040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22041","reference_id":"RHSA-2025:22041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22051","reference_id":"RHSA-2025:22051","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22055","reference_id":"RHSA-2025:22055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22056","reference_id":"RHSA-2025:22056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22077","reference_id":"RHSA-2025:22077","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22096","reference_id":"RHSA-2025:22096","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22164","reference_id":"RHSA-2025:22164","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22167","reference_id":"RHSA-2025:22167","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22364","reference_id":"RHSA-2025:22364","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22365","reference_id":"RHSA-2025:22365","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22426","reference_id":"RHSA-2025:22426","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22427","reference_id":"RHSA-2025:22427","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22667","reference_id":"RHSA-2025:22667","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22729","reference_id":"RHSA-2025:22729","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22742","reference_id":"RHSA-2025:22742","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22753","reference_id":"RHSA-2025:22753","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0031","reference_id":"RHSA-2026:0031","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0033","reference_id":"RHSA-2026:0033","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0034","reference_id":"RHSA-2026:0034","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0035","reference_id":"RHSA-2026:0035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0036","reference_id":"RHSA-2026:0036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0036"},{"reference_url":"https://usn.ubuntu.com/7846-1/","reference_id":"USN-7846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-62230"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sx54-5s5r-ckg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66664?format=json","vulnerability_id":"VCID-t1cy-srre-nkbp","summary":"xorg: xmayland: Value overflow in XkbSetCompatMap()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62231","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01913","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01982","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0089","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00892","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00895","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00898","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html","reference_id":"003635.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402660","reference_id":"2402660","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402660"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-62231","reference_id":"CVE-2025-62231","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-62231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19432","reference_id":"RHSA-2025:19432","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19433","reference_id":"RHSA-2025:19433","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19434","reference_id":"RHSA-2025:19434","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19435","reference_id":"RHSA-2025:19435","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19489","reference_id":"RHSA-2025:19489","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19623","reference_id":"RHSA-2025:19623","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19909","reference_id":"RHSA-2025:19909","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20958","reference_id":"RHSA-2025:20958","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20960","reference_id":"RHSA-2025:20960","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20961","reference_id":"RHSA-2025:20961","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21035","reference_id":"RHSA-2025:21035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22040","reference_id":"RHSA-2025:22040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22041","reference_id":"RHSA-2025:22041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22051","reference_id":"RHSA-2025:22051","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22055","reference_id":"RHSA-2025:22055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22056","reference_id":"RHSA-2025:22056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22077","reference_id":"RHSA-2025:22077","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22096","reference_id":"RHSA-2025:22096","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22164","reference_id":"RHSA-2025:22164","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22167","reference_id":"RHSA-2025:22167","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22364","reference_id":"RHSA-2025:22364","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22365","reference_id":"RHSA-2025:22365","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22426","reference_id":"RHSA-2025:22426","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22427","reference_id":"RHSA-2025:22427","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22667","reference_id":"RHSA-2025:22667","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22729","reference_id":"RHSA-2025:22729","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22742","reference_id":"RHSA-2025:22742","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22753","reference_id":"RHSA-2025:22753","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0031","reference_id":"RHSA-2026:0031","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0033","reference_id":"RHSA-2026:0033","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0034","reference_id":"RHSA-2026:0034","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0035","reference_id":"RHSA-2026:0035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0036","reference_id":"RHSA-2026:0036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0036"},{"reference_url":"https://usn.ubuntu.com/7846-1/","reference_id":"USN-7846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-62231"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1cy-srre-nkbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34790?format=json","vulnerability_id":"VCID-tngq-27px-w7cm","summary":"A vulnerability in X.Org X Server allows local users to escalate\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14665","reference_id":"","reference_type":"","scores":[{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92554","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92606","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.9261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.9256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92567","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92604","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1637761","reference_id":"1637761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1637761"},{"reference_url":"https://security.archlinux.org/ASA-201810-15","reference_id":"ASA-201810-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201810-15"},{"reference_url":"https://security.archlinux.org/AVG-788","reference_id":"AVG-788","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-788"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb"},{"reference_url":"https://twitter.com/hackerfantastic/status/1055517801224396800","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://twitter.com/hackerfantastic/status/1055517801224396800"},{"reference_url":"https://security.gentoo.org/glsa/201810-09","reference_id":"GLSA-201810-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3410","reference_id":"RHSA-2018:3410","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3410"},{"reference_url":"https://usn.ubuntu.com/3802-1/","reference_id":"USN-3802-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3802-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2018-14665"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tngq-27px-w7cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49325?format=json","vulnerability_id":"VCID-trsp-u7xt-a3ck","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6377","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60023","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60018","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61461","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61418","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253291","reference_id":"2253291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253291"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7886","reference_id":"RHSA-2023:7886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0006","reference_id":"RHSA-2024:0006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0009","reference_id":"RHSA-2024:0009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0010","reference_id":"RHSA-2024:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0014","reference_id":"RHSA-2024:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0015","reference_id":"RHSA-2024:0015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0016","reference_id":"RHSA-2024:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0017","reference_id":"RHSA-2024:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0018","reference_id":"RHSA-2024:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0020","reference_id":"RHSA-2024:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13998","reference_id":"RHSA-2025:13998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13998"},{"reference_url":"https://usn.ubuntu.com/6555-1/","reference_id":"USN-6555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-1/"},{"reference_url":"https://usn.ubuntu.com/6555-2/","reference_id":"USN-6555-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2023-6377"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trsp-u7xt-a3ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49323?format=json","vulnerability_id":"VCID-un9v-4svv-2baj","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5367","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20029","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19906","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19764","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243091","reference_id":"2243091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243091"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6802","reference_id":"RHSA-2023:6802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6808","reference_id":"RHSA-2023:6808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7373","reference_id":"RHSA-2023:7373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7388","reference_id":"RHSA-2023:7388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7405","reference_id":"RHSA-2023:7405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7405"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7428","reference_id":"RHSA-2023:7428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7436","reference_id":"RHSA-2023:7436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7526","reference_id":"RHSA-2023:7526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7533","reference_id":"RHSA-2023:7533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0010","reference_id":"RHSA-2024:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0128","reference_id":"RHSA-2024:0128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6453-1/","reference_id":"USN-6453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-1/"},{"reference_url":"https://usn.ubuntu.com/6453-2/","reference_id":"USN-6453-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2023-5367"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-un9v-4svv-2baj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46301?format=json","vulnerability_id":"VCID-uxsy-k3cg-mkdd","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46343","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7881","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151758","reference_id":"2151758","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151758"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-46343","reference_id":"CVE-2022-46343","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-46343"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2022-46343"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41833?format=json","vulnerability_id":"VCID-v2jb-vhek-fkcz","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31082","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09653","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0968","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09587","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09548","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09635","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2024-April/003497.html","reference_id":"003497.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2024-April/003497.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271999","reference_id":"2271999","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271999"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31082","reference_id":"CVE-2024-31082","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31082"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-31082"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v2jb-vhek-fkcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41476?format=json","vulnerability_id":"VCID-v8w1-zu65-c7ac","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13723","reference_id":"","reference_type":"","scores":[{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3309","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3317","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33505","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33425","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33364","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13723"},{"reference_url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac","reference_id":"","reference_type":"","scores":[],"url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:C"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4000"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/10/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/10/04/10"},{"reference_url":"http://www.securityfocus.com/bid/101253","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101253"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500388","reference_id":"1500388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500388"},{"reference_url":"https://security.archlinux.org/ASA-201710-10","reference_id":"ASA-201710-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-10"},{"reference_url":"https://security.archlinux.org/AVG-432","reference_id":"AVG-432","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-432"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13723","reference_id":"CVE-2017-13723","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13723"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://usn.ubuntu.com/3453-1/","reference_id":"USN-3453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-13723"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v8w1-zu65-c7ac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49331?format=json","vulnerability_id":"VCID-v9p1-8sb6-9ufr","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21885","reference_id":"","reference_type":"","scores":[{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.4698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49293","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49296","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256540","reference_id":"2256540","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256540"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-21885","reference_id":"CVE-2024-21885","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-21885"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2024-21885"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v9p1-8sb6-9ufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46303?format=json","vulnerability_id":"VCID-wh9v-35ju-vbcb","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0494","reference_id":"","reference_type":"","scores":[{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69831","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72341","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72292","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72304","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2023-February/003320.html","reference_id":"003320.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2023-February/003320.html"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec","reference_id":"0ba6d8c37071131a49790243cdac55392ecf71ec","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777","reference_id":"1030777","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165995","reference_id":"2165995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165995"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0622","reference_id":"RHSA-2023:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0623","reference_id":"RHSA-2023:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0662","reference_id":"RHSA-2023:0662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0663","reference_id":"RHSA-2023:0663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0664","reference_id":"RHSA-2023:0664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0665","reference_id":"RHSA-2023:0665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0671","reference_id":"RHSA-2023:0671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0675","reference_id":"RHSA-2023:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://usn.ubuntu.com/5846-1/","reference_id":"USN-5846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2023-0494"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wh9v-35ju-vbcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46305?format=json","vulnerability_id":"VCID-wp8b-r6p1-7kcf","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1393","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23801","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23841","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2586","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25908","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/03/29/1","reference_id":"1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/03/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180288","reference_id":"2180288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180288"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110","reference_id":"26ef545b3502f61ca722a7a3373507e88ef64110","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/","reference_id":"BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/","reference_id":"H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/","reference_id":"MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/","reference_id":"NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/","reference_id":"PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/","reference_id":"QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1548","reference_id":"RHSA-2023:1548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1549","reference_id":"RHSA-2023:1549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1551","reference_id":"RHSA-2023:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1592","reference_id":"RHSA-2023:1592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1594","reference_id":"RHSA-2023:1594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1598","reference_id":"RHSA-2023:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1599","reference_id":"RHSA-2023:1599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1600","reference_id":"RHSA-2023:1600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6340","reference_id":"RHSA-2023:6340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6341","reference_id":"RHSA-2023:6341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6916","reference_id":"RHSA-2023:6916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6917","reference_id":"RHSA-2023:6917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/","reference_id":"SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/","reference_id":"SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/"},{"reference_url":"https://usn.ubuntu.com/5986-1/","reference_id":"USN-5986-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5986-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2023-1393"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wp8b-r6p1-7kcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32177?format=json","vulnerability_id":"VCID-wq4p-h17p-fyf4","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33035","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276","reference_id":"1887276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2020-25712"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wq4p-h17p-fyf4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69417?format=json","vulnerability_id":"VCID-wyuw-13t9-rbg1","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49176","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2423","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44752","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9","reference_id":"03731b326a80b582e48d939fe62cb1e2b10400d9","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073","reference_id":"1108073","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369954","reference_id":"2369954","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369954"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1","reference_id":"4fc4d76b2c7aaed61ed2653f997783a3714c4fe1","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49176","reference_id":"CVE-2025-49176","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"}],"aliases":["CVE-2025-49176"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wyuw-13t9-rbg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49326?format=json","vulnerability_id":"VCID-x3p6-a59z-ebf3","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6478","reference_id":"","reference_type":"","scores":[{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78506","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78941","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78972","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78996","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78999","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78958","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253298","reference_id":"2253298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253298"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7886","reference_id":"RHSA-2023:7886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0006","reference_id":"RHSA-2024:0006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0009","reference_id":"RHSA-2024:0009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0010","reference_id":"RHSA-2024:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0014","reference_id":"RHSA-2024:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0015","reference_id":"RHSA-2024:0015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0016","reference_id":"RHSA-2024:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0017","reference_id":"RHSA-2024:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0018","reference_id":"RHSA-2024:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0020","reference_id":"RHSA-2024:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6555-1/","reference_id":"USN-6555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-1/"},{"reference_url":"https://usn.ubuntu.com/6555-2/","reference_id":"USN-6555-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2023-6478"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x3p6-a59z-ebf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63880?format=json","vulnerability_id":"VCID-xk4b-12p1-ckam","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12186","reference_id":"","reference_type":"","scores":[{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.7332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.7328","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73273","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509216","reference_id":"1509216","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509216"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035661?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036852?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1%2Bdeb9u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%252Bdeb9u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"}],"aliases":["CVE-2017-12186"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xk4b-12p1-ckam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46287?format=json","vulnerability_id":"VCID-zhdy-8stm-q3ey","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4009","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25604","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25799","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25757","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25684","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026072","reference_id":"2026072","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026072"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"},{"reference_url":"https://usn.ubuntu.com/5193-2/","reference_id":"USN-5193-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-2/"},{"reference_url":"https://usn.ubuntu.com/5193-3/","reference_id":"USN-5193-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037786?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.4-1%2Bdeb10u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.4-1%252Bdeb10u4"},{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"}],"aliases":["CVE-2021-4009"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhdy-8stm-q3ey"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32008?format=json","vulnerability_id":"VCID-42nu-8tap-5fbj","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8095","reference_id":"","reference_type":"","scores":[{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78249","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71599","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71599"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168694","reference_id":"1168694","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168694"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8095","reference_id":"CVE-2014-8095","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8095"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8095"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42nu-8tap-5fbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32013?format=json","vulnerability_id":"VCID-4phf-c3vm-23db","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8100","reference_id":"","reference_type":"","scores":[{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79763","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7977","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71602","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71602"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168711","reference_id":"1168711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168711"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8100","reference_id":"CVE-2014-8100","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8100"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8100"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4phf-c3vm-23db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32015?format=json","vulnerability_id":"VCID-537j-hg6y-jbgb","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8102","reference_id":"","reference_type":"","scores":[{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78249","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71608","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71608"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168714","reference_id":"1168714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168714"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8102","reference_id":"CVE-2014-8102","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8102"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8102"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-537j-hg6y-jbgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32017?format=json","vulnerability_id":"VCID-5gza-pvdd-zycf","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0255","reference_id":"","reference_type":"","scores":[{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91009","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91018","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91041","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91055","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91079","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91094","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91087","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1189062","reference_id":"1189062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1189062"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0797","reference_id":"RHSA-2015:0797","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0797"},{"reference_url":"https://usn.ubuntu.com/2500-1/","reference_id":"USN-2500-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2500-1/"},{"reference_url":"https://usn.ubuntu.com/USN-4772-1/","reference_id":"USN-USN-4772-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4772-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2015-0255"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gza-pvdd-zycf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35553?format=json","vulnerability_id":"VCID-agtx-nbcj-jufj","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4396","reference_id":"","reference_type":"","scores":[{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.8357","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83608","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1014561","reference_id":"1014561","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1014561"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1426","reference_id":"RHSA-2013:1426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1426"},{"reference_url":"https://usn.ubuntu.com/1990-1/","reference_id":"USN-1990-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1990-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2013-4396"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agtx-nbcj-jufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32007?format=json","vulnerability_id":"VCID-c9vv-1x48-9uej","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8094","reference_id":"","reference_type":"","scores":[{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77528","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77393","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77399","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77429","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77439","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77481","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77506","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77513","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.securityfocus.com/bid/71601","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71601"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168691","reference_id":"1168691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168691"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8094","reference_id":"CVE-2014-8094","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8094"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8094"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9vv-1x48-9uej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32014?format=json","vulnerability_id":"VCID-hsa9-8jn1-jyhr","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8101","reference_id":"","reference_type":"","scores":[{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79482","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79507","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79505","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79547","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71605","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71605"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168713","reference_id":"1168713","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168713"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8101","reference_id":"CVE-2014-8101","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8101"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8101"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hsa9-8jn1-jyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32011?format=json","vulnerability_id":"VCID-jbua-ftmv-fygf","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610","reference_id":"","reference_type":"","scores":[],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8098","reference_id":"","reference_type":"","scores":[{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77185","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77036","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.7707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77097","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.7713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77171","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71606","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71606"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168707","reference_id":"1168707","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168707"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8098","reference_id":"CVE-2014-8098","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8098"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"},{"reference_url":"https://usn.ubuntu.com/2438-1/","reference_id":"USN-2438-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2438-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8098"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jbua-ftmv-fygf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41697?format=json","vulnerability_id":"VCID-mmwp-nchs-6bdh","summary":"Multiple vulnerabilities have been found in X.Org X Server, the\n    worst of which may allow authenticated attackers to read from or send\n    information to arbitrary X11 clients.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3418","reference_id":"","reference_type":"","scores":[{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65766","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.6589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.659","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65911","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65909","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216020","reference_id":"1216020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216020"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308","reference_id":"774308","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308"},{"reference_url":"https://security.gentoo.org/glsa/201701-64","reference_id":"GLSA-201701-64","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-64"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2015-3418"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmwp-nchs-6bdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32006?format=json","vulnerability_id":"VCID-sju7-ms24-wff1","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610","reference_id":"","reference_type":"","scores":[],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8093","reference_id":"","reference_type":"","scores":[{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79763","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7977","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71596","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71596"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168688","reference_id":"1168688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168688"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8093","reference_id":"CVE-2014-8093","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8093"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8093"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sju7-ms24-wff1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32012?format=json","vulnerability_id":"VCID-str7-xe4q-6fek","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8099","reference_id":"","reference_type":"","scores":[{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.7995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79996","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80016","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.8","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80022","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.8005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80055","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.securityfocus.com/bid/71600","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71600"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168710","reference_id":"1168710","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168710"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8099","reference_id":"CVE-2014-8099","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8099"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8099"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-str7-xe4q-6fek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32004?format=json","vulnerability_id":"VCID-tame-fxrq-qfa7","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8091","reference_id":"","reference_type":"","scores":[{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.8952","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89531","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89551","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71597","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71597"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168680","reference_id":"1168680","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168680"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8091","reference_id":"CVE-2014-8091","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8091"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"},{"reference_url":"https://usn.ubuntu.com/2438-1/","reference_id":"USN-2438-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2438-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8091"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tame-fxrq-qfa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32016?format=json","vulnerability_id":"VCID-tz65-cx8m-g3e5","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8103","reference_id":"","reference_type":"","scores":[{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82669","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82744","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82809","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168716","reference_id":"1168716","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168716"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8103","reference_id":"CVE-2014-8103","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8103"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8103"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tz65-cx8m-g3e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32010?format=json","vulnerability_id":"VCID-v6yp-dquj-6bhh","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8097","reference_id":"","reference_type":"","scores":[{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79763","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7977","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71604","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71604"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168705","reference_id":"1168705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168705"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8097","reference_id":"CVE-2014-8097","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8097"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8097"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6yp-dquj-6bhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32009?format=json","vulnerability_id":"VCID-vkq6-6h66-pubm","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8096","reference_id":"","reference_type":"","scores":[{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77233","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77083","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.771","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.7717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77185","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77186","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71598","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71598"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168700","reference_id":"1168700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168700"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8096","reference_id":"CVE-2014-8096","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8096"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8096"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vkq6-6h66-pubm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32005?format=json","vulnerability_id":"VCID-vzmd-vvau-wbf5","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8092","reference_id":"","reference_type":"","scores":[{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79627","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79633","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.7967","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79737","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71595","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71595"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168684","reference_id":"1168684","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168684"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8092","reference_id":"CVE-2014-8092","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8092"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2014-8092"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzmd-vvau-wbf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41473?format=json","vulnerability_id":"VCID-wjbk-4mjq-ybab","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6424","reference_id":"","reference_type":"","scores":[{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.9134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91347","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.9135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91384","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91382","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1037984","reference_id":"1037984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1037984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922","reference_id":"742922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922"},{"reference_url":"https://security.gentoo.org/glsa/201701-64","reference_id":"GLSA-201701-64","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-64"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1868","reference_id":"RHSA-2013:1868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1868"},{"reference_url":"https://usn.ubuntu.com/2500-1/","reference_id":"USN-2500-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2500-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571434?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-42nu-8tap-5fbj"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-4phf-c3vm-23db"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-537j-hg6y-jbgb"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-5gza-pvdd-zycf"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-agtx-nbcj-jufj"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-c9vv-1x48-9uej"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hsa9-8jn1-jyhr"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jbua-ftmv-fygf"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-mmwp-nchs-6bdh"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sju7-ms24-wff1"},{"vulnerability":"VCID-str7-xe4q-6fek"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tame-fxrq-qfa7"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-tz65-cx8m-g3e5"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v6yp-dquj-6bhh"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-vkq6-6h66-pubm"},{"vulnerability":"VCID-vzmd-vvau-wbf5"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wjbk-4mjq-ybab"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035660?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1742-kcnn-pyg5"},{"vulnerability":"VCID-1cjg-y5qm-sffh"},{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-1xa1-uf4t-z3bs"},{"vulnerability":"VCID-28er-gwh3-rugq"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-36vg-vekq-vbhj"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3aj3-ufnq-13f3"},{"vulnerability":"VCID-3q8e-92u3-sufy"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-44yr-b94s-nfd5"},{"vulnerability":"VCID-49m7-vqbk-s3ce"},{"vulnerability":"VCID-4ngr-6ccu-r7fv"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-5awx-j7z7-qyak"},{"vulnerability":"VCID-62fw-zp51-gyhw"},{"vulnerability":"VCID-68t6-6w3n-jffa"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-6qsh-kaxk-zuf9"},{"vulnerability":"VCID-6rcq-qxef-nuf7"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-7r23-ad57-yydp"},{"vulnerability":"VCID-954x-c1x3-67gg"},{"vulnerability":"VCID-9cjy-6fj5-r7ag"},{"vulnerability":"VCID-a4bk-m98g-93f8"},{"vulnerability":"VCID-bv8h-xa48-hbh7"},{"vulnerability":"VCID-bvay-s9w4-muf8"},{"vulnerability":"VCID-c81n-kx59-q7h5"},{"vulnerability":"VCID-cfjq-38mk-hbhf"},{"vulnerability":"VCID-dcdh-w9a1-wfff"},{"vulnerability":"VCID-e7w3-3hpm-hbec"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-ebqr-xztt-y3bj"},{"vulnerability":"VCID-em7x-adw1-tyaz"},{"vulnerability":"VCID-fcac-qzvs-rfa8"},{"vulnerability":"VCID-fgnr-h7rm-83d4"},{"vulnerability":"VCID-fpny-yp5d-zbcu"},{"vulnerability":"VCID-h242-94ba-ykcb"},{"vulnerability":"VCID-hhnr-av5b-t7dc"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hzj2-b4e4-ubf6"},{"vulnerability":"VCID-j6qd-r6ua-cfbm"},{"vulnerability":"VCID-jrx7-pbf3-h3at"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-jvgv-d94j-mqa1"},{"vulnerability":"VCID-m2hp-k4c4-m3db"},{"vulnerability":"VCID-n95v-qmcg-6bek"},{"vulnerability":"VCID-nbdz-scr3-hbhv"},{"vulnerability":"VCID-p1tf-2c6u-tygr"},{"vulnerability":"VCID-pcn1-ehd2-g3f7"},{"vulnerability":"VCID-phkz-t2yr-m7em"},{"vulnerability":"VCID-psr2-gkpa-z7fj"},{"vulnerability":"VCID-q8jj-uwq7-qubk"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-tngq-27px-w7cm"},{"vulnerability":"VCID-trsp-u7xt-a3ck"},{"vulnerability":"VCID-un9v-4svv-2baj"},{"vulnerability":"VCID-uxsy-k3cg-mkdd"},{"vulnerability":"VCID-v2jb-vhek-fkcz"},{"vulnerability":"VCID-v8w1-zu65-c7ac"},{"vulnerability":"VCID-v9p1-8sb6-9ufr"},{"vulnerability":"VCID-wh9v-35ju-vbcb"},{"vulnerability":"VCID-wp8b-r6p1-7kcf"},{"vulnerability":"VCID-wq4p-h17p-fyf4"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-x3p6-a59z-ebf3"},{"vulnerability":"VCID-xk4b-12p1-ckam"},{"vulnerability":"VCID-zhdy-8stm-q3ey"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}],"aliases":["CVE-2013-6424"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wjbk-4mjq-ybab"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1"}