{"url":"http://public2.vulnerablecode.io/api/packages/1038399?format=json","purl":"pkg:deb/debian/libx11@2:1.6.2-3","type":"deb","namespace":"debian","name":"libx11","version":"2:1.6.2-3","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2:1.7.2-1+deb11u2","latest_non_vulnerable_version":"2:1.7.2-1+deb11u2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41702?format=json","vulnerability_id":"VCID-16w3-mvk5-8bfg","summary":"Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14600","reference_id":"","reference_type":"","scores":[{"value":"0.07254","scoring_system":"epss","scoring_elements":"0.91592","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07254","scoring_system":"epss","scoring_elements":"0.91599","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07254","scoring_system":"epss","scoring_elements":"0.91605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07254","scoring_system":"epss","scoring_elements":"0.91613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07254","scoring_system":"epss","scoring_elements":"0.91626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07254","scoring_system":"epss","scoring_elements":"0.91632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07254","scoring_system":"epss","scoring_elements":"0.91636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93427","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93428","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93447","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93458","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93463","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11007","scoring_system":"epss","scoring_elements":"0.93459","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623242","reference_id":"1623242","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623242"},{"reference_url":"https://security.gentoo.org/glsa/201811-01","reference_id":"GLSA-201811-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2079","reference_id":"RHSA-2019:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2079"},{"reference_url":"https://usn.ubuntu.com/3758-1/","reference_id":"USN-3758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-1/"},{"reference_url":"https://usn.ubuntu.com/3758-2/","reference_id":"USN-3758-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038402?format=json","purl":"pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"}],"aliases":["CVE-2018-14600"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-16w3-mvk5-8bfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47741?format=json","vulnerability_id":"VCID-22vh-wnqm-qqh5","summary":"Multiple vulnerabilities have been found in X.Org  server and\n    libraries, the worse of which allowing local attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7943","reference_id":"","reference_type":"","scores":[{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.8894","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.88948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.88964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.88967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.8899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.89002","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.88997","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.88995","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.89009","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.89007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.89003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.89019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.89027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.8903","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0439","scoring_system":"epss","scoring_elements":"0.89037","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7943"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381861","reference_id":"1381861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381861"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439","reference_id":"840439","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439"},{"reference_url":"https://security.gentoo.org/glsa/201704-03","reference_id":"GLSA-201704-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-03"},{"reference_url":"https://usn.ubuntu.com/3758-1/","reference_id":"USN-3758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-1/"},{"reference_url":"https://usn.ubuntu.com/3758-2/","reference_id":"USN-3758-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038401?format=json","purl":"pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16w3-mvk5-8bfg"},{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-enay-5y1j-ffa4"},{"vulnerability":"VCID-npqc-cahn-cfgk"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1"}],"aliases":["CVE-2016-7943"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37952?format=json","vulnerability_id":"VCID-941j-gajx-1qc9","summary":"A vulnerability in X.Org X11 library could lead to a Denial of\n    Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-31535","reference_id":"","reference_type":"","scores":[{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83998","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83857","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83873","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83905","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83915","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83963","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-31535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1961822","reference_id":"1961822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1961822"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737","reference_id":"988737","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737"},{"reference_url":"https://security.archlinux.org/ASA-202105-12","reference_id":"ASA-202105-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-12"},{"reference_url":"https://security.archlinux.org/AVG-1968","reference_id":"AVG-1968","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1968"},{"reference_url":"https://security.gentoo.org/glsa/202105-16","reference_id":"GLSA-202105-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3296","reference_id":"RHSA-2021:3296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3477","reference_id":"RHSA-2021:3477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4326","reference_id":"RHSA-2021:4326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4326"},{"reference_url":"https://usn.ubuntu.com/4966-1/","reference_id":"USN-4966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4966-1/"},{"reference_url":"https://usn.ubuntu.com/4966-2/","reference_id":"USN-4966-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4966-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038402?format=json","purl":"pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1052558?format=json","purl":"pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"}],"aliases":["CVE-2021-31535"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-941j-gajx-1qc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58827?format=json","vulnerability_id":"VCID-byet-4t52-1kf5","summary":"Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43785","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27169","published_at":"2026-05-05T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27561","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242252","reference_id":"2242252","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242252"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-43785","reference_id":"CVE-2023-43785","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-43785"},{"reference_url":"https://security.gentoo.org/glsa/202407-21","reference_id":"GLSA-202407-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2145","reference_id":"RHSA-2024:2145","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2973","reference_id":"RHSA-2024:2973","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2973"},{"reference_url":"https://usn.ubuntu.com/6407-1/","reference_id":"USN-6407-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6407-1/"},{"reference_url":"https://usn.ubuntu.com/6407-2/","reference_id":"USN-6407-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6407-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052558?format=json","purl":"pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"}],"aliases":["CVE-2023-43785"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byet-4t52-1kf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58828?format=json","vulnerability_id":"VCID-e89b-946w-g7fp","summary":"Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43786","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24557","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24251","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2444","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24485","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24414","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24406","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24377","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242253","reference_id":"2242253","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242253"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-43786","reference_id":"CVE-2023-43786","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-43786"},{"reference_url":"https://security.gentoo.org/glsa/202407-21","reference_id":"GLSA-202407-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2145","reference_id":"RHSA-2024:2145","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2973","reference_id":"RHSA-2024:2973","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2973"},{"reference_url":"https://usn.ubuntu.com/6407-1/","reference_id":"USN-6407-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6407-1/"},{"reference_url":"https://usn.ubuntu.com/6407-2/","reference_id":"USN-6407-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6407-2/"},{"reference_url":"https://usn.ubuntu.com/6408-1/","reference_id":"USN-6408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6408-1/"},{"reference_url":"https://usn.ubuntu.com/6408-2/","reference_id":"USN-6408-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6408-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052558?format=json","purl":"pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"}],"aliases":["CVE-2023-43786"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e89b-946w-g7fp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41701?format=json","vulnerability_id":"VCID-enay-5y1j-ffa4","summary":"Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14599","reference_id":"","reference_type":"","scores":[{"value":"0.01708","scoring_system":"epss","scoring_elements":"0.82256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01708","scoring_system":"epss","scoring_elements":"0.82269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01708","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01708","scoring_system":"epss","scoring_elements":"0.82283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01708","scoring_system":"epss","scoring_elements":"0.8231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01708","scoring_system":"epss","scoring_elements":"0.82317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01708","scoring_system":"epss","scoring_elements":"0.82337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82473","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82504","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82508","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.8253","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82546","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623250","reference_id":"1623250","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623250"},{"reference_url":"https://security.gentoo.org/glsa/201811-01","reference_id":"GLSA-201811-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2079","reference_id":"RHSA-2019:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2079"},{"reference_url":"https://usn.ubuntu.com/3758-1/","reference_id":"USN-3758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-1/"},{"reference_url":"https://usn.ubuntu.com/3758-2/","reference_id":"USN-3758-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038402?format=json","purl":"pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"}],"aliases":["CVE-2018-14599"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-enay-5y1j-ffa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47736?format=json","vulnerability_id":"VCID-ngsj-tzms-97e8","summary":"Multiple vulnerabilities have been found in X.Org  server and\n    libraries, the worse of which allowing local attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7942","reference_id":"","reference_type":"","scores":[{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89332","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89348","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.8935","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.8938","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89373","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89407","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89409","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04712","scoring_system":"epss","scoring_elements":"0.89418","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381859","reference_id":"1381859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381859"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439","reference_id":"840439","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439"},{"reference_url":"https://security.gentoo.org/glsa/201704-03","reference_id":"GLSA-201704-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-03"},{"reference_url":"https://usn.ubuntu.com/3758-1/","reference_id":"USN-3758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-1/"},{"reference_url":"https://usn.ubuntu.com/3758-2/","reference_id":"USN-3758-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038401?format=json","purl":"pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16w3-mvk5-8bfg"},{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-enay-5y1j-ffa4"},{"vulnerability":"VCID-npqc-cahn-cfgk"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1"}],"aliases":["CVE-2016-7942"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41700?format=json","vulnerability_id":"VCID-npqc-cahn-cfgk","summary":"Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14598","reference_id":"","reference_type":"","scores":[{"value":"0.01105","scoring_system":"epss","scoring_elements":"0.78032","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01105","scoring_system":"epss","scoring_elements":"0.78041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01105","scoring_system":"epss","scoring_elements":"0.7807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01105","scoring_system":"epss","scoring_elements":"0.78053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01105","scoring_system":"epss","scoring_elements":"0.78079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01105","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01105","scoring_system":"epss","scoring_elements":"0.78109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86725","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86694","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03035","scoring_system":"epss","scoring_elements":"0.86703","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623238","reference_id":"1623238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623238"},{"reference_url":"https://security.gentoo.org/glsa/201811-01","reference_id":"GLSA-201811-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2079","reference_id":"RHSA-2019:2079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2079"},{"reference_url":"https://usn.ubuntu.com/3758-1/","reference_id":"USN-3758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-1/"},{"reference_url":"https://usn.ubuntu.com/3758-2/","reference_id":"USN-3758-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3758-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038402?format=json","purl":"pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"}],"aliases":["CVE-2018-14598"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-npqc-cahn-cfgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58829?format=json","vulnerability_id":"VCID-r53t-w3cp-4kbm","summary":"Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43787","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12708","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12671","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12556","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12852","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12669","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12695","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242254","reference_id":"2242254","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242254"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-43787","reference_id":"CVE-2023-43787","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-43787"},{"reference_url":"https://security.gentoo.org/glsa/202407-21","reference_id":"GLSA-202407-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2145","reference_id":"RHSA-2024:2145","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2973","reference_id":"RHSA-2024:2973","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2973"},{"reference_url":"https://usn.ubuntu.com/6407-1/","reference_id":"USN-6407-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6407-1/"},{"reference_url":"https://usn.ubuntu.com/6407-2/","reference_id":"USN-6407-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6407-2/"},{"reference_url":"https://usn.ubuntu.com/6408-1/","reference_id":"USN-6408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6408-1/"},{"reference_url":"https://usn.ubuntu.com/6408-2/","reference_id":"USN-6408-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6408-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052558?format=json","purl":"pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"}],"aliases":["CVE-2023-43787"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r53t-w3cp-4kbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58826?format=json","vulnerability_id":"VCID-sujt-svg4-kbfp","summary":"Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3138","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24061","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23883","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23913","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23922","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24653","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24836","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24824","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24777","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133","reference_id":"1038133","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213748","reference_id":"2213748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213748"},{"reference_url":"https://security.gentoo.org/glsa/202407-21","reference_id":"GLSA-202407-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6497","reference_id":"RHSA-2023:6497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7029","reference_id":"RHSA-2023:7029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1088","reference_id":"RHSA-2024:1088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1088"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1417","reference_id":"RHSA-2024:1417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1417"},{"reference_url":"https://usn.ubuntu.com/6168-1/","reference_id":"USN-6168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6168-1/"},{"reference_url":"https://usn.ubuntu.com/6168-2/","reference_id":"USN-6168-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6168-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052558?format=json","purl":"pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"}],"aliases":["CVE-2023-3138"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sujt-svg4-kbfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59404?format=json","vulnerability_id":"VCID-tmju-y3w5-z3es","summary":"Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14363","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3548","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35022","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1872473","reference_id":"1872473","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1872473"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008","reference_id":"969008","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008"},{"reference_url":"https://security.gentoo.org/glsa/202008-18","reference_id":"GLSA-202008-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4908","reference_id":"RHSA-2020:4908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4946","reference_id":"RHSA-2020:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4487-1/","reference_id":"USN-4487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-1/"},{"reference_url":"https://usn.ubuntu.com/4487-2/","reference_id":"USN-4487-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052558?format=json","purl":"pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"}],"aliases":["CVE-2020-14363"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59403?format=json","vulnerability_id":"VCID-tsyg-kprr-67ck","summary":"Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14344","reference_id":"","reference_type":"","scores":[{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3701","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36561","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36765","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37087","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36796","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862255","reference_id":"1862255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862255"},{"reference_url":"https://security.archlinux.org/AVG-1212","reference_id":"AVG-1212","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1212"},{"reference_url":"https://security.gentoo.org/glsa/202008-18","reference_id":"GLSA-202008-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4487-1/","reference_id":"USN-4487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-1/"},{"reference_url":"https://usn.ubuntu.com/4487-2/","reference_id":"USN-4487-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4487-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052558?format=json","purl":"pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"}],"aliases":["CVE-2020-14344"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55988?format=json","vulnerability_id":"VCID-e19k-nptv-ffgr","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7439","reference_id":"","reference_type":"","scores":[{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.8309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83138","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83132","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83128","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83166","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.8323","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7439"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209943","reference_id":"1209943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/2568-1/","reference_id":"USN-2568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571227?format=json","purl":"pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16w3-mvk5-8bfg"},{"vulnerability":"VCID-22vh-wnqm-qqh5"},{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e19k-nptv-ffgr"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-enay-5y1j-ffa4"},{"vulnerability":"VCID-ngsj-tzms-97e8"},{"vulnerability":"VCID-npqc-cahn-cfgk"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1038399?format=json","purl":"pkg:deb/debian/libx11@2:1.6.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16w3-mvk5-8bfg"},{"vulnerability":"VCID-22vh-wnqm-qqh5"},{"vulnerability":"VCID-941j-gajx-1qc9"},{"vulnerability":"VCID-byet-4t52-1kf5"},{"vulnerability":"VCID-e89b-946w-g7fp"},{"vulnerability":"VCID-enay-5y1j-ffa4"},{"vulnerability":"VCID-ngsj-tzms-97e8"},{"vulnerability":"VCID-npqc-cahn-cfgk"},{"vulnerability":"VCID-r53t-w3cp-4kbm"},{"vulnerability":"VCID-sujt-svg4-kbfp"},{"vulnerability":"VCID-tmju-y3w5-z3es"},{"vulnerability":"VCID-tsyg-kprr-67ck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3"}],"aliases":["CVE-2013-7439"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3"}