{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","type":"deb","namespace":"debian","name":"xorg-server","version":"2:21.1.22-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32174?format=json","vulnerability_id":"VCID-1742-kcnn-pyg5","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46152","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46084","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142","reference_id":"1869142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943562?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14361"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1742-kcnn-pyg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46286?format=json","vulnerability_id":"VCID-1cjg-y5qm-sffh","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4008","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22471","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026059","reference_id":"2026059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026059"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"},{"reference_url":"https://usn.ubuntu.com/5193-2/","reference_id":"USN-5193-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-2/"},{"reference_url":"https://usn.ubuntu.com/5193-3/","reference_id":"USN-5193-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943566?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943565?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2021-4008"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjg-y5qm-sffh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59264?format=json","vulnerability_id":"VCID-1pcv-f5h3-9fe9","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26595","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345257","reference_id":"2345257","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345257"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26595","reference_id":"CVE-2025-26595","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26595"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26595"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pcv-f5h3-9fe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39717?format=json","vulnerability_id":"VCID-1xa1-uf4t-z3bs","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12177","reference_id":"","reference_type":"","scores":[{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.7645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76411","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509218","reference_id":"1509218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509218"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12177"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xa1-uf4t-z3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46300?format=json","vulnerability_id":"VCID-28er-gwh3-rugq","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46342","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33989","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34059","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35225","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34924","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151757","reference_id":"2151757","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-46342","reference_id":"CVE-2022-46342","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-46342"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943572?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943571?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-46342"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69421?format=json","vulnerability_id":"VCID-2cp3-p3yx-17be","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49180","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31292","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.3112","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3612","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369981","reference_id":"2369981","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369981"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6","reference_id":"3c3a4b767b16174d3213055947ea7f4f88e10ec6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49180","reference_id":"CVE-2025-49180","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943598?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943597?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943599?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-49180"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cp3-p3yx-17be"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51981?format=json","vulnerability_id":"VCID-2u2q-xxe5-q7e9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"http://osvdb.org/34905","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/34905"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2437.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2437","reference_id":"","reference_type":"","scores":[{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.87977","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.87987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88001","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88026","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88032","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88035","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88047","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88048","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03757","scoring_system":"epss","scoring_elements":"0.88065","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2437"},{"reference_url":"http://secunia.com/advisories/25121","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25121"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33976","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33976"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102901-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102901-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200067-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200067-1"},{"reference_url":"http://www.rapid7.com/advisories/R7-0027.jsp","reference_id":"","reference_type":"","scores":[],"url":"http://www.rapid7.com/advisories/R7-0027.jsp"},{"reference_url":"http://www.securityfocus.com/bid/23741","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23741"},{"reference_url":"http://www.securitytracker.com/id?1017984","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017984"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1601","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1601"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1658","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422936","reference_id":"422936","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422936"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xserver:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xserver:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xserver:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_window_system:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_window_system:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_window_system:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2437","reference_id":"CVE-2007-2437","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2437"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29939.txt","reference_id":"CVE-2007-2437;OSVDB-34905","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29939.txt"},{"reference_url":"https://www.securityfocus.com/bid/23741/info","reference_id":"CVE-2007-2437;OSVDB-34905","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/23741/info"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943539?format=json","purl":"pkg:deb/debian/xorg-server@2:1.3.0.0.dfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.3.0.0.dfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-2437"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2u2q-xxe5-q7e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69419?format=json","vulnerability_id":"VCID-2vrb-n6cc-c7bc","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49178","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21881","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21741","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4076","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41056","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41027","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4095","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40844","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369977","reference_id":"2369977","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369977"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49178","reference_id":"CVE-2025-49178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49178"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2","reference_id":"d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943598?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943597?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943599?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-49178"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vrb-n6cc-c7bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39743?format=json","vulnerability_id":"VCID-36vg-vekq-vbhj","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12183","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509224","reference_id":"1509224","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509224"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12183"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36vg-vekq-vbhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59267?format=json","vulnerability_id":"VCID-37e1-pzxj-2fdt","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26598","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06135","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06123","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08866","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09209","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20528","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345254","reference_id":"2345254","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345254"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26598","reference_id":"CVE-2025-26598","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26598"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26598"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37e1-pzxj-2fdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63878?format=json","vulnerability_id":"VCID-3aj3-ufnq-13f3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12184","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509225","reference_id":"1509225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509225"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12184"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3aj3-ufnq-13f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267381?format=json","vulnerability_id":"VCID-3f4a-m4rt-qqej","summary":"","references":[{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34002"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-34002"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3f4a-m4rt-qqej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39725?format=json","vulnerability_id":"VCID-3q8e-92u3-sufy","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12179","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509220","reference_id":"1509220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509220"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12179"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3q8e-92u3-sufy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59265?format=json","vulnerability_id":"VCID-41cd-s77z-6bcc","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26596","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345256","reference_id":"2345256","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345256"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26596","reference_id":"CVE-2025-26596","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26596"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26596"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-41cd-s77z-6bcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32008?format=json","vulnerability_id":"VCID-42nu-8tap-5fbj","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8095","reference_id":"","reference_type":"","scores":[{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78249","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71599","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71599"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168694","reference_id":"1168694","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168694"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8095","reference_id":"CVE-2014-8095","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8095"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8095"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42nu-8tap-5fbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46298?format=json","vulnerability_id":"VCID-44yr-b94s-nfd5","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46340","reference_id":"","reference_type":"","scores":[{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78293","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.79004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01202","scoring_system":"epss","scoring_elements":"0.78988","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151755","reference_id":"2151755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151755"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943572?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943571?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-46340"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32170?format=json","vulnerability_id":"VCID-49m7-vqbk-s3ce","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29159","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241","reference_id":"1862241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"},{"reference_url":"https://usn.ubuntu.com/4490-1/","reference_id":"USN-4490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4490-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943562?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14345"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49m7-vqbk-s3ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35495?format=json","vulnerability_id":"VCID-4en9-s3k2-eydr","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1940.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1940.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1940","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23144","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23487","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2343","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23412","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23375","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23159","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23152","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1940"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=63353","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=63353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940"},{"reference_url":"http://www.debian.org/security/2013/dsa-2661","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2661"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/18/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/18/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1803-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1803-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=950438","reference_id":"950438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=950438"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1940","reference_id":"CVE-2013-1940","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1940"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1620","reference_id":"RHSA-2013:1620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1620"},{"reference_url":"https://usn.ubuntu.com/1803-1/","reference_id":"USN-1803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1803-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943551?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.4-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1940"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4en9-s3k2-eydr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41834?format=json","vulnerability_id":"VCID-4ngr-6ccu-r7fv","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31083","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26069","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2612","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27884","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27893","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27841","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272000","reference_id":"2272000","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272000"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31083","reference_id":"CVE-2024-31083","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31083"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1785","reference_id":"RHSA-2024:1785","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2036","reference_id":"RHSA-2024:2036","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2037","reference_id":"RHSA-2024:2037","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2038","reference_id":"RHSA-2024:2038","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2039","reference_id":"RHSA-2024:2039","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2040","reference_id":"RHSA-2024:2040","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2041","reference_id":"RHSA-2024:2041","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2042","reference_id":"RHSA-2024:2042","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2080","reference_id":"RHSA-2024:2080","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2616","reference_id":"RHSA-2024:2616","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3258","reference_id":"RHSA-2024:3258","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3261","reference_id":"RHSA-2024:3261","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3343","reference_id":"RHSA-2024:3343","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9093","reference_id":"RHSA-2024:9093","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9122","reference_id":"RHSA-2024:9122","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943589?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943590?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-31083"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ngr-6ccu-r7fv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32013?format=json","vulnerability_id":"VCID-4phf-c3vm-23db","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8100","reference_id":"","reference_type":"","scores":[{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79763","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7977","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71602","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71602"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168711","reference_id":"1168711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168711"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8100","reference_id":"CVE-2014-8100","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8100"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8100"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4phf-c3vm-23db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49883?format=json","vulnerability_id":"VCID-4ws1-kuah-rffq","summary":"A format string vulnerability in X.Org X Server may allow local\n    privilege escalation or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2118.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2118.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2118","reference_id":"","reference_type":"","scores":[{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84189","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.8419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.8423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84248","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84254","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84279","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02146","scoring_system":"epss","scoring_elements":"0.84293","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2118"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673148","reference_id":"673148","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=814126","reference_id":"814126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=814126"},{"reference_url":"https://security.gentoo.org/glsa/201207-04","reference_id":"GLSA-201207-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201207-04"},{"reference_url":"https://usn.ubuntu.com/1502-1/","reference_id":"USN-1502-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1502-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943550?format=json","purl":"pkg:deb/debian/xorg-server@2:1.12.1.902-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.1.902-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2012-2118"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ws1-kuah-rffq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59271?format=json","vulnerability_id":"VCID-515f-a8yj-4fej","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26600","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345252","reference_id":"2345252","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345252"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26600","reference_id":"CVE-2025-26600","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26600"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26600"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-515f-a8yj-4fej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32015?format=json","vulnerability_id":"VCID-537j-hg6y-jbgb","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8102","reference_id":"","reference_type":"","scores":[{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78249","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71608","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71608"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168714","reference_id":"1168714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168714"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8102","reference_id":"CVE-2014-8102","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8102"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8102"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-537j-hg6y-jbgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87254?format=json","vulnerability_id":"VCID-552y-dzaq-4fg9","summary":"X.org: multiple GLX input sanitization flaws","references":[{"reference_url":"http://cgit.freedesktop.org/xorg/xserver/commit?id=3f0d3f4d97bce75c1828635c322b6560a45a037f","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/xorg/xserver/commit?id=3f0d3f4d97bce75c1828635c322b6560a45a037f"},{"reference_url":"http://cgit.freedesktop.org/xorg/xserver/commit?id=6c69235a9dfc52e4b4e47630ff4bab1a820eb543","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/xorg/xserver/commit?id=6c69235a9dfc52e4b4e47630ff4bab1a820eb543"},{"reference_url":"http://cgit.freedesktop.org/xorg/xserver/commit?id=ec9c97c6bf70b523bc500bd3adf62176f1bb33a4","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/xorg/xserver/commit?id=ec9c97c6bf70b523bc500bd3adf62176f1bb33a4"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-1359.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-1359.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-1360.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-1360.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4818.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4818.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4818","reference_id":"","reference_type":"","scores":[{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86211","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86255","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4818"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=28823","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=28823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/09/22/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/09/22/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/09/23/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/09/23/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/09/23/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/09/23/6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=740954","reference_id":"740954","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=740954"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4818","reference_id":"CVE-2010-4818","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1359","reference_id":"RHSA-2011:1359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1360","reference_id":"RHSA-2011:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1360"},{"reference_url":"https://usn.ubuntu.com/1232-1/","reference_id":"USN-1232-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1232-1/"},{"reference_url":"https://usn.ubuntu.com/1232-3/","reference_id":"USN-1232-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1232-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943546?format=json","purl":"pkg:deb/debian/xorg-server@2:1.9.99.902-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.9.99.902-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2010-4818"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-552y-dzaq-4fg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49329?format=json","vulnerability_id":"VCID-5awx-j7z7-qyak","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0408","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04147","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04271","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06484","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06496","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257689","reference_id":"2257689","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257689"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0408","reference_id":"CVE-2024-0408","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0408"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943587?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943586?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943588?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-0408"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5awx-j7z7-qyak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32017?format=json","vulnerability_id":"VCID-5gza-pvdd-zycf","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0255","reference_id":"","reference_type":"","scores":[{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91009","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91018","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91041","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91055","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91079","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91094","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06422","scoring_system":"epss","scoring_elements":"0.91087","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1189062","reference_id":"1189062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1189062"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0797","reference_id":"RHSA-2015:0797","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0797"},{"reference_url":"https://usn.ubuntu.com/2500-1/","reference_id":"USN-2500-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2500-1/"},{"reference_url":"https://usn.ubuntu.com/USN-4772-1/","reference_id":"USN-USN-4772-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4772-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943555?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2015-0255"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gza-pvdd-zycf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88626?format=json","vulnerability_id":"VCID-5hm3-stns-77a4","summary":"gnome-screensaver loses keyboard grab when running under compiz","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3920.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3920","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15956","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15813","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15872","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15849","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3920"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=350271","reference_id":"350271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=350271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449108","reference_id":"449108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0485","reference_id":"RHSA-2008:0485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0485"},{"reference_url":"https://usn.ubuntu.com/537-1/","reference_id":"USN-537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/537-1/"},{"reference_url":"https://usn.ubuntu.com/537-2/","reference_id":"USN-537-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/537-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943540?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080118-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080118-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-3920"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5hm3-stns-77a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63779?format=json","vulnerability_id":"VCID-62fw-zp51-gyhw","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10971","reference_id":"","reference_type":"","scores":[{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.8558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.8567","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.857","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473204","reference_id":"1473204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473204"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492","reference_id":"867492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492"},{"reference_url":"https://security.archlinux.org/ASA-201708-11","reference_id":"ASA-201708-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-11"},{"reference_url":"https://security.archlinux.org/AVG-341","reference_id":"AVG-341","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-341"},{"reference_url":"https://usn.ubuntu.com/3362-1/","reference_id":"USN-3362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3362-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943557?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-10971"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-62fw-zp51-gyhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60580?format=json","vulnerability_id":"VCID-68k5-jp7v-mqd7","summary":"A debugging functionality in the X.Org X Server that is bound to a\n    hotkey by default can be used by local attackers to circumvent screen\n    locking utilities.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0064.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0064","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2386","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23804","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23816","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23621","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0064"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656410","reference_id":"656410","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656410"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783039","reference_id":"783039","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783039"},{"reference_url":"https://security.gentoo.org/glsa/201201-16","reference_id":"GLSA-201201-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-16"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943549?format=json","purl":"pkg:deb/debian/xorg-server@2:1.11.3.901-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.11.3.901-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2012-0064"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68k5-jp7v-mqd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49324?format=json","vulnerability_id":"VCID-68t6-6w3n-jffa","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5380","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22401","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22413","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22403","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24043","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2406","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24149","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244736","reference_id":"2244736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244736"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7428","reference_id":"RHSA-2023:7428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2298","reference_id":"RHSA-2024:2298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3067","reference_id":"RHSA-2024:3067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3067"},{"reference_url":"https://usn.ubuntu.com/6453-1/","reference_id":"USN-6453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-1/"},{"reference_url":"https://usn.ubuntu.com/6453-2/","reference_id":"USN-6453-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943579?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943578?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943580?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-5380"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68t6-6w3n-jffa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49831?format=json","vulnerability_id":"VCID-6cns-hbja-1bab","summary":"X.org, libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm are vulnerable\n    to local privilege escalations because of unchecked setuid() calls.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4447","reference_id":"","reference_type":"","scores":[{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38864","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39011","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38752","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.3864","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447"},{"reference_url":"https://security.gentoo.org/glsa/200608-25","reference_id":"GLSA-200608-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-25"},{"reference_url":"https://security.gentoo.org/glsa/200704-22","reference_id":"GLSA-200704-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200704-22"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943536?format=json","purl":"pkg:deb/debian/xorg-server@1:1.0.2-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@1:1.0.2-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4447"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6cns-hbja-1bab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59266?format=json","vulnerability_id":"VCID-6hwh-7tvr-sqgn","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26597","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345255","reference_id":"2345255","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345255"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26597","reference_id":"CVE-2025-26597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26597"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26597"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6hwh-7tvr-sqgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46290?format=json","vulnerability_id":"VCID-6qsh-kaxk-zuf9","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4011","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12368","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12518","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12404","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12381","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12282","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026074","reference_id":"2026074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026074"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"},{"reference_url":"https://usn.ubuntu.com/5193-2/","reference_id":"USN-5193-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-2/"},{"reference_url":"https://usn.ubuntu.com/5193-3/","reference_id":"USN-5193-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943566?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943565?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2021-4011"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qsh-kaxk-zuf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49328?format=json","vulnerability_id":"VCID-6rcq-qxef-nuf7","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0229","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52842","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52821","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55137","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5512","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256690","reference_id":"2256690","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0229","reference_id":"CVE-2024-0229","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0229"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943587?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943586?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943588?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-0229"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcq-qxef-nuf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59269?format=json","vulnerability_id":"VCID-7nax-5yw9-eye8","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26599","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345253","reference_id":"2345253","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345253"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26599","reference_id":"CVE-2025-26599","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26599"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26599"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7nax-5yw9-eye8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41474?format=json","vulnerability_id":"VCID-7r23-ad57-yydp","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13721","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24582","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24727","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24719","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2468","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24808","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24711","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13721"},{"reference_url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1","reference_id":"","reference_type":"","scores":[],"url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:C"},{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4000"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/10/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/10/04/10"},{"reference_url":"http://www.securityfocus.com/bid/101238","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101238"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500387","reference_id":"1500387","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500387"},{"reference_url":"https://security.archlinux.org/ASA-201710-10","reference_id":"ASA-201710-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-10"},{"reference_url":"https://security.archlinux.org/AVG-432","reference_id":"AVG-432","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-432"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13721","reference_id":"CVE-2017-13721","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13721"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://usn.ubuntu.com/3453-1/","reference_id":"USN-3453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943559?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-13721"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7r23-ad57-yydp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41631?format=json","vulnerability_id":"VCID-7t5d-r9wp-fqgn","summary":"Multiple vulnerabilities have been discovered in the X.Org X server and\n    Xfont library, allowing for a local privilege escalation and arbitrary code\n    execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6429.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6429","reference_id":"","reference_type":"","scores":[{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84567","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84647","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0227","scoring_system":"epss","scoring_elements":"0.84703","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=413721","reference_id":"413721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=413721"},{"reference_url":"https://security.gentoo.org/glsa/200801-09","reference_id":"GLSA-200801-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0029","reference_id":"RHSA-2008:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0030","reference_id":"RHSA-2008:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0031","reference_id":"RHSA-2008:0031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0031"},{"reference_url":"https://usn.ubuntu.com/571-1/","reference_id":"USN-571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943542?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-6429"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7t5d-r9wp-fqgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62243?format=json","vulnerability_id":"VCID-8k9m-8p49-fyac","summary":"Sean Larsson from iDefense Labs has found multiple vulnerabilities in the\n    DBE and Render extensions.","references":[{"reference_url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=463","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=463"},{"reference_url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html"},{"reference_url":"http://osvdb.org/32084","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/32084"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6101.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6101.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6101","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13538","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1366","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13743","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13793","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13725","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13586","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13637","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101"},{"reference_url":"http://secunia.com/advisories/23633","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23633"},{"reference_url":"http://secunia.com/advisories/23670","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23670"},{"reference_url":"http://secunia.com/advisories/23684","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23684"},{"reference_url":"http://secunia.com/advisories/23689","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23689"},{"reference_url":"http://secunia.com/advisories/23698","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23698"},{"reference_url":"http://secunia.com/advisories/23705","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23705"},{"reference_url":"http://secunia.com/advisories/23758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23758"},{"reference_url":"http://secunia.com/advisories/23789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23789"},{"reference_url":"http://secunia.com/advisories/23966","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23966"},{"reference_url":"http://secunia.com/advisories/24168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24168"},{"reference_url":"http://secunia.com/advisories/24210","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24210"},{"reference_url":"http://secunia.com/advisories/24247","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24247"},{"reference_url":"http://secunia.com/advisories/24401","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24401"},{"reference_url":"http://secunia.com/advisories/25802","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25802"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200701-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200701-25.xml"},{"reference_url":"http://securitytracker.com/id?1017495","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017495"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31337","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31337"},{"reference_url":"https://issues.rpath.com/browse/RPL-920","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-920"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10490","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10490"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm"},{"reference_url":"https://www.debian.org/security/2007/dsa-1249","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2007/dsa-1249"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_08_x.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_08_x.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html"},{"reference_url":"http://www.securityfocus.com/bid/21968","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21968"},{"reference_url":"http://www.ubuntu.com/usn/usn-403-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-403-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0108","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0108"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0109","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0109"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0589","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0589"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0669","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0669"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2233","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618238","reference_id":"1618238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618238"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6101","reference_id":"CVE-2006-6101","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6101"},{"reference_url":"https://security.gentoo.org/glsa/200701-25","reference_id":"GLSA-200701-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200701-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0002","reference_id":"RHSA-2007:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0003","reference_id":"RHSA-2007:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0003"},{"reference_url":"https://usn.ubuntu.com/403-1/","reference_id":"USN-403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943537?format=json","purl":"pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2006-6101"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8k9m-8p49-fyac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63780?format=json","vulnerability_id":"VCID-954x-c1x3-67gg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10972","reference_id":"","reference_type":"","scores":[{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68207","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68292","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.6834","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473205","reference_id":"1473205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473205"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492","reference_id":"867492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492"},{"reference_url":"https://security.archlinux.org/ASA-201708-11","reference_id":"ASA-201708-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-11"},{"reference_url":"https://security.archlinux.org/AVG-341","reference_id":"AVG-341","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-341"},{"reference_url":"https://usn.ubuntu.com/3362-1/","reference_id":"USN-3362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3362-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943557?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-10972"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-954x-c1x3-67gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41832?format=json","vulnerability_id":"VCID-9cjy-6fj5-r7ag","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31081","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31424","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31456","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271998","reference_id":"2271998","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271998"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31081","reference_id":"CVE-2024-31081","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31081"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1785","reference_id":"RHSA-2024:1785","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2036","reference_id":"RHSA-2024:2036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2037","reference_id":"RHSA-2024:2037","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2038","reference_id":"RHSA-2024:2038","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2039","reference_id":"RHSA-2024:2039","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2040","reference_id":"RHSA-2024:2040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2041","reference_id":"RHSA-2024:2041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2042","reference_id":"RHSA-2024:2042","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2080","reference_id":"RHSA-2024:2080","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2616","reference_id":"RHSA-2024:2616","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3258","reference_id":"RHSA-2024:3258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3261","reference_id":"RHSA-2024:3261","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3343","reference_id":"RHSA-2024:3343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9093","reference_id":"RHSA-2024:9093","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9122","reference_id":"RHSA-2024:9122","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943589?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943590?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-31081"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9cjy-6fj5-r7ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41632?format=json","vulnerability_id":"VCID-9qnq-nhan-7ubj","summary":"Multiple vulnerabilities have been discovered in the X.Org X server and\n    Xfont library, allowing for a local privilege escalation and arbitrary code\n    execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0006.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0006","reference_id":"","reference_type":"","scores":[{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.9657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96601","published_at":"2026-04-16T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96609","published_at":"2026-04-21T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.9661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.29274","scoring_system":"epss","scoring_elements":"0.96612","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=428044","reference_id":"428044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=428044"},{"reference_url":"https://security.gentoo.org/glsa/200801-09","reference_id":"GLSA-200801-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0029","reference_id":"RHSA-2008:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0030","reference_id":"RHSA-2008:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0064","reference_id":"RHSA-2008:0064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0064"},{"reference_url":"https://usn.ubuntu.com/571-1/","reference_id":"USN-571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943542?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-0006"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9qnq-nhan-7ubj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47294?format=json","vulnerability_id":"VCID-9y4q-2tnh-jkcs","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1379.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1379.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1379","reference_id":"","reference_type":"","scores":[{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76966","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76985","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77018","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30628"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/32545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32545"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020246","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020246"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43016","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29669","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29669"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445414","reference_id":"445414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445414"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1379","reference_id":"CVE-2008-1379","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1379"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0512","reference_id":"RHSA-2008:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0512"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943543?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-1379"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9y4q-2tnh-jkcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46302?format=json","vulnerability_id":"VCID-a4bk-m98g-93f8","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46344","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75742","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75772","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76622","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.7661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00966","scoring_system":"epss","scoring_elements":"0.76648","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151760","reference_id":"2151760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151760"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943572?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943571?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-46344"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35553?format=json","vulnerability_id":"VCID-agtx-nbcj-jufj","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4396","reference_id":"","reference_type":"","scores":[{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.8357","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83608","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1014561","reference_id":"1014561","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1014561"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1426","reference_id":"RHSA-2013:1426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1426"},{"reference_url":"https://usn.ubuntu.com/1990-1/","reference_id":"USN-1990-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1990-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943552?format=json","purl":"pkg:deb/debian/xorg-server@2:1.14.3-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.14.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4396"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agtx-nbcj-jufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41447?format=json","vulnerability_id":"VCID-atmg-xvzy-nfe2","summary":"A buffer overflow in the XRender extension potentially allows any X.Org\n    user to execute arbitrary code with elevated privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1526.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1526","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63271","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63346","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63358","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63356","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618042","reference_id":"1618042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618042"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378464","reference_id":"378464","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378464"},{"reference_url":"https://security.gentoo.org/glsa/200605-02","reference_id":"GLSA-200605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0451","reference_id":"RHSA-2006:0451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0451"},{"reference_url":"https://usn.ubuntu.com/280-1/","reference_id":"USN-280-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/280-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943535?format=json","purl":"pkg:deb/debian/xorg-server@1:1.0.2-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@1:1.0.2-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2006-1526"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-atmg-xvzy-nfe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95358?format=json","vulnerability_id":"VCID-b14x-4mtq-5fc7","summary":"In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49737","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26212","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42097","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42034","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4199","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49737"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/issues/1260","reference_id":"1260","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/issues/1260"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5","reference_id":"bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081338","reference_id":"bugreport.cgi?bug=1081338","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081338"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/dc7cb45482cea6ccec22d117ca0b489500b4d0a0","reference_id":"dc7cb45482cea6ccec22d117ca0b489500b4d0a0","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/dc7cb45482cea6ccec22d117ca0b489500b4d0a0"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943573?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-49737"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b14x-4mtq-5fc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51244?format=json","vulnerability_id":"VCID-bv8h-xa48-hbh7","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2319","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10182","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10349","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10138","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10269","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903","reference_id":"1014903","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106671","reference_id":"2106671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106671"},{"reference_url":"https://security.archlinux.org/AVG-2770","reference_id":"AVG-2770","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2770"},{"reference_url":"https://security.gentoo.org/glsa/202210-30","reference_id":"GLSA-202210-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5905","reference_id":"RHSA-2022:5905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7583","reference_id":"RHSA-2022:7583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8221","reference_id":"RHSA-2022:8221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8222","reference_id":"RHSA-2022:8222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8222"},{"reference_url":"https://usn.ubuntu.com/5510-1/","reference_id":"USN-5510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-1/"},{"reference_url":"https://usn.ubuntu.com/5510-2/","reference_id":"USN-5510-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943568?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943567?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-2319"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bv8h-xa48-hbh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46294?format=json","vulnerability_id":"VCID-bvay-s9w4-muf8","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3551","reference_id":"","reference_type":"","scores":[{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73165","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73201","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73213","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140701","reference_id":"2140701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140701"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8491","reference_id":"RHSA-2022:8491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://usn.ubuntu.com/5740-1/","reference_id":"USN-5740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5740-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943570?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943569?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-3551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvay-s9w4-muf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39730?format=json","vulnerability_id":"VCID-c81n-kx59-q7h5","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12180","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509221","reference_id":"1509221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509221"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12180"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c81n-kx59-q7h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32007?format=json","vulnerability_id":"VCID-c9vv-1x48-9uej","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8094","reference_id":"","reference_type":"","scores":[{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77528","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77393","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77399","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77429","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77439","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77481","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77506","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77513","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.securityfocus.com/bid/71601","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71601"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168691","reference_id":"1168691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168691"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8094","reference_id":"CVE-2014-8094","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8094"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8094"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9vv-1x48-9uej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39735?format=json","vulnerability_id":"VCID-cfjq-38mk-hbhf","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12181","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509222","reference_id":"1509222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509222"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12181"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfjq-38mk-hbhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87691?format=json","vulnerability_id":"VCID-crec-pfnb-hbgm","summary":"X.org: ProcRenderAddGlyphs input sanitization flaw","references":[{"reference_url":"http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc","reference_id":"","reference_type":"","scores":[],"url":"http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc"},{"reference_url":"http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-1359.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-1359.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-1360.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-1360.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4819.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4819.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4819","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22557","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22468","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22501","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22462","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22459","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22408","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22242","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4819"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=28801","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=28801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819"},{"reference_url":"http://securitytracker.com/id?1026149","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1026149"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/09/22/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/09/22/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/09/23/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/09/23/5"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=740961","reference_id":"740961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=740961"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x.org-xserver:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.6.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x.org-xserver:1.7.6.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.6.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.7:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x.org-xserver:1.7.7:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.7:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4819","reference_id":"CVE-2010-4819","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1359","reference_id":"RHSA-2011:1359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1360","reference_id":"RHSA-2011:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1360"},{"reference_url":"https://usn.ubuntu.com/1232-1/","reference_id":"USN-1232-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1232-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943547?format=json","purl":"pkg:deb/debian/xorg-server@2:1.9.0.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.9.0.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2010-4819"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-crec-pfnb-hbgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46296?format=json","vulnerability_id":"VCID-cxf3-8znp-rbbz","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3553","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30387","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30788","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30747","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140706","reference_id":"2140706","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140706"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://vuldb.com/?id.211053","reference_id":"?id.211053","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/"}],"url":"https://vuldb.com/?id.211053"},{"reference_url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3","reference_id":"?id=dfd057996b26420309c324ec844a5ba6dd07eda3","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/"}],"url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943567?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-3553"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cxf3-8znp-rbbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63879?format=json","vulnerability_id":"VCID-dcdh-w9a1-wfff","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12185","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509215","reference_id":"1509215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509215"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcdh-w9a1-wfff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46297?format=json","vulnerability_id":"VCID-e7w3-3hpm-hbec","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4283","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39135","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40375","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40362","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151761","reference_id":"2151761","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151761"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-4283","reference_id":"CVE-2022-4283","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-4283"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943572?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943571?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-4283"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66662?format=json","vulnerability_id":"VCID-e9px-edn1-tufs","summary":"xorg: xmayland: Use-after-free in XPresentNotify structure creation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62229","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0264","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02716","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html","reference_id":"003635.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402649","reference_id":"2402649","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402649"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-62229","reference_id":"CVE-2025-62229","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-62229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19432","reference_id":"RHSA-2025:19432","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19433","reference_id":"RHSA-2025:19433","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19434","reference_id":"RHSA-2025:19434","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19435","reference_id":"RHSA-2025:19435","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19489","reference_id":"RHSA-2025:19489","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19623","reference_id":"RHSA-2025:19623","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19909","reference_id":"RHSA-2025:19909","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20958","reference_id":"RHSA-2025:20958","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20960","reference_id":"RHSA-2025:20960","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20961","reference_id":"RHSA-2025:20961","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21035","reference_id":"RHSA-2025:21035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22040","reference_id":"RHSA-2025:22040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22041","reference_id":"RHSA-2025:22041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22051","reference_id":"RHSA-2025:22051","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22055","reference_id":"RHSA-2025:22055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22056","reference_id":"RHSA-2025:22056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22077","reference_id":"RHSA-2025:22077","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22096","reference_id":"RHSA-2025:22096","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22164","reference_id":"RHSA-2025:22164","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22167","reference_id":"RHSA-2025:22167","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22364","reference_id":"RHSA-2025:22364","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22365","reference_id":"RHSA-2025:22365","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22426","reference_id":"RHSA-2025:22426","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22427","reference_id":"RHSA-2025:22427","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22667","reference_id":"RHSA-2025:22667","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22729","reference_id":"RHSA-2025:22729","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22742","reference_id":"RHSA-2025:22742","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22753","reference_id":"RHSA-2025:22753","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0031","reference_id":"RHSA-2026:0031","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0033","reference_id":"RHSA-2026:0033","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0034","reference_id":"RHSA-2026:0034","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0035","reference_id":"RHSA-2026:0035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0036","reference_id":"RHSA-2026:0036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0036"},{"reference_url":"https://usn.ubuntu.com/7846-1/","reference_id":"USN-7846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943601?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u17%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943602?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.20-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-62229"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9px-edn1-tufs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63881?format=json","vulnerability_id":"VCID-ebqr-xztt-y3bj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12187","reference_id":"","reference_type":"","scores":[{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73662","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73557","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73529","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73619","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.7362","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509217","reference_id":"1509217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509217"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12187"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebqr-xztt-y3bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51245?format=json","vulnerability_id":"VCID-em7x-adw1-tyaz","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2320","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18358","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18543","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18499","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18471","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903","reference_id":"1014903","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106683","reference_id":"2106683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106683"},{"reference_url":"https://security.archlinux.org/AVG-2770","reference_id":"AVG-2770","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2770"},{"reference_url":"https://security.gentoo.org/glsa/202210-30","reference_id":"GLSA-202210-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5905","reference_id":"RHSA-2022:5905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7583","reference_id":"RHSA-2022:7583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8221","reference_id":"RHSA-2022:8221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8222","reference_id":"RHSA-2022:8222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8222"},{"reference_url":"https://usn.ubuntu.com/5510-1/","reference_id":"USN-5510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-1/"},{"reference_url":"https://usn.ubuntu.com/5510-2/","reference_id":"USN-5510-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5510-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943568?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943567?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-2320"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-em7x-adw1-tyaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47890?format=json","vulnerability_id":"VCID-fb3m-nwqg-q7ca","summary":"A vulnerability has been discovered in the Composite extension of the X.Org\n    X server, allowing for a local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4730.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4730.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4730","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26093","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26216","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26069","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26014","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25992","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25958","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25893","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25845","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=285991","reference_id":"285991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=285991"},{"reference_url":"https://security.gentoo.org/glsa/200710-16","reference_id":"GLSA-200710-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0898","reference_id":"RHSA-2007:0898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0898"},{"reference_url":"https://usn.ubuntu.com/514-1/","reference_id":"USN-514-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/514-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943541?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-4730"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fb3m-nwqg-q7ca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46289?format=json","vulnerability_id":"VCID-fcac-qzvs-rfa8","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4010","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23318","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23145","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23355","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23375","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026073","reference_id":"2026073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026073"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943566?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943565?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2021-4010"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcac-qzvs-rfa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49330?format=json","vulnerability_id":"VCID-fgnr-h7rm-83d4","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0409","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03005","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04852","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0482","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257690","reference_id":"2257690","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0409","reference_id":"CVE-2024-0409","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0409"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943587?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943586?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943588?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-0409"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fgnr-h7rm-83d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39739?format=json","vulnerability_id":"VCID-fpny-yp5d-zbcu","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12182","reference_id":"","reference_type":"","scores":[{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.7645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76396","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509223","reference_id":"1509223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509223"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12182"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpny-yp5d-zbcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47293?format=json","vulnerability_id":"VCID-g15b-mt4a-kbhc","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1377.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1377","reference_id":"","reference_type":"","scores":[{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85016","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.8492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84947","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.8497","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84985","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84987","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85017","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30628"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/32545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32545"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020247","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020247"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445403","reference_id":"445403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445403"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1377","reference_id":"CVE-2008-1377","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1377"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0512","reference_id":"RHSA-2008:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0512"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943543?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-1377"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g15b-mt4a-kbhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41696?format=json","vulnerability_id":"VCID-h242-94ba-ykcb","summary":"Multiple vulnerabilities have been found in X.Org X Server, the\n    worst of which may allow authenticated attackers to read from or send\n    information to arbitrary X11 clients.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3164","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20267","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20201","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20046","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1219548","reference_id":"1219548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1219548"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410","reference_id":"788410","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410"},{"reference_url":"https://security.gentoo.org/glsa/201701-64","reference_id":"GLSA-201701-64","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-64"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943556?format=json","purl":"pkg:deb/debian/xorg-server@2:1.17.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.17.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3164"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h242-94ba-ykcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32176?format=json","vulnerability_id":"VCID-hhnr-av5b-t7dc","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39028","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144","reference_id":"1869144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943562?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14362"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhnr-av5b-t7dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59273?format=json","vulnerability_id":"VCID-hkrr-v71f-xqdb","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26601","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345251","reference_id":"2345251","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345251"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26601","reference_id":"CVE-2025-26601","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26601"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26601"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hkrr-v71f-xqdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32014?format=json","vulnerability_id":"VCID-hsa9-8jn1-jyhr","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8101","reference_id":"","reference_type":"","scores":[{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79482","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79507","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79505","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01269","scoring_system":"epss","scoring_elements":"0.79547","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71605","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71605"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168713","reference_id":"1168713","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168713"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8101","reference_id":"CVE-2014-8101","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8101"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8101"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hsa9-8jn1-jyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35494?format=json","vulnerability_id":"VCID-hu5s-38nd-uqbs","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1056.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1056","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16772","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16994","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16851","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16728","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16734","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1677","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16629","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052324","reference_id":"1052324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052324"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://usn.ubuntu.com/1990-1/","reference_id":"USN-1990-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1990-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943545?format=json","purl":"pkg:deb/debian/xorg-server@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1056"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hu5s-38nd-uqbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267379?format=json","vulnerability_id":"VCID-hxab-xyu1-xkgc","summary":"","references":[{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-34000"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxab-xyu1-xkgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50769?format=json","vulnerability_id":"VCID-hzj2-b4e4-ubf6","summary":"A vulnerability in X.Org X Server may allow users to escalate\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3472","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26016","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.261","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25973","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25918","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944167","reference_id":"1944167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944167"},{"reference_url":"https://security.archlinux.org/AVG-1811","reference_id":"AVG-1811","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1811"},{"reference_url":"https://security.archlinux.org/AVG-1812","reference_id":"AVG-1812","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1812"},{"reference_url":"https://security.gentoo.org/glsa/202104-02","reference_id":"GLSA-202104-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2033","reference_id":"RHSA-2021:2033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2033"},{"reference_url":"https://usn.ubuntu.com/4905-1/","reference_id":"USN-4905-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4905-1/"},{"reference_url":"https://usn.ubuntu.com/4905-2/","reference_id":"USN-4905-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4905-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943564?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3472"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hzj2-b4e4-ubf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49332?format=json","vulnerability_id":"VCID-j6qd-r6ua-cfbm","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21886","reference_id":"","reference_type":"","scores":[{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.4698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49293","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49296","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256542","reference_id":"2256542","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256542"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-21886","reference_id":"CVE-2024-21886","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-21886"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943587?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943586?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943588?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-21886"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6qd-r6ua-cfbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32011?format=json","vulnerability_id":"VCID-jbua-ftmv-fygf","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610","reference_id":"","reference_type":"","scores":[],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8098","reference_id":"","reference_type":"","scores":[{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77185","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77036","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.7707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77097","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.7713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0101","scoring_system":"epss","scoring_elements":"0.77171","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71606","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71606"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168707","reference_id":"1168707","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168707"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8098","reference_id":"CVE-2014-8098","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8098"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"},{"reference_url":"https://usn.ubuntu.com/2438-1/","reference_id":"USN-2438-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2438-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8098"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jbua-ftmv-fygf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46299?format=json","vulnerability_id":"VCID-jrx7-pbf3-h3at","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46341","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7881","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151756","reference_id":"2151756","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151756"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-46341","reference_id":"CVE-2022-46341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-46341"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943572?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943571?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-46341"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41830?format=json","vulnerability_id":"VCID-juet-bb4m-hkhq","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9632","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17648","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17692","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18045","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17759","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17769","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244","reference_id":"1086244","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245","reference_id":"1086245","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317233","reference_id":"2317233","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317233"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-9632","reference_id":"CVE-2024-9632","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-9632"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10090","reference_id":"RHSA-2024:10090","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:10090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8798","reference_id":"RHSA-2024:8798","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:8798"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9540","reference_id":"RHSA-2024:9540","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9579","reference_id":"RHSA-2024:9579","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9601","reference_id":"RHSA-2024:9601","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9690","reference_id":"RHSA-2024:9690","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9816","reference_id":"RHSA-2024:9816","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9818","reference_id":"RHSA-2024:9818","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9819","reference_id":"RHSA-2024:9819","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9820","reference_id":"RHSA-2024:9820","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9901","reference_id":"RHSA-2024:9901","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7085-1/","reference_id":"USN-7085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7085-1/"},{"reference_url":"https://usn.ubuntu.com/7085-2/","reference_id":"USN-7085-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7085-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943592?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u14?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943591?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943593?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.13-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.13-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-9632"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-juet-bb4m-hkhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39720?format=json","vulnerability_id":"VCID-jvgv-d94j-mqa1","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12178","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509219","reference_id":"1509219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509219"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12178"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvgv-d94j-mqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46292?format=json","vulnerability_id":"VCID-m2hp-k4c4-m3db","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3550","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61464","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61485","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.6148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61479","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140698","reference_id":"2140698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140698"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8491","reference_id":"RHSA-2022:8491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://usn.ubuntu.com/5740-1/","reference_id":"USN-5740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5740-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943570?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943569?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-3550"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2hp-k4c4-m3db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69418?format=json","vulnerability_id":"VCID-may9-9sdj-cbbd","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49177.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49177","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09409","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09389","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24987","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24886","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49177"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369955","reference_id":"2369955","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369955"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d965522c34befa6af","reference_id":"ab02fb96b1c701c3bb47617d965522c34befa6af","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d965522c34befa6af"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49177","reference_id":"CVE-2025-49177","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943545?format=json","purl":"pkg:deb/debian/xorg-server@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943597?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943599?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-49177"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-may9-9sdj-cbbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41697?format=json","vulnerability_id":"VCID-mmwp-nchs-6bdh","summary":"Multiple vulnerabilities have been found in X.Org X Server, the\n    worst of which may allow authenticated attackers to read from or send\n    information to arbitrary X11 clients.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3418","reference_id":"","reference_type":"","scores":[{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65766","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.6589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.659","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65911","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65909","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216020","reference_id":"1216020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216020"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308","reference_id":"774308","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308"},{"reference_url":"https://security.gentoo.org/glsa/201701-64","reference_id":"GLSA-201701-64","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-64"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943555?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3418"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmwp-nchs-6bdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62245?format=json","vulnerability_id":"VCID-mwwx-h1zr-x7gh","summary":"Sean Larsson from iDefense Labs has found multiple vulnerabilities in the\n    DBE and Render extensions.","references":[{"reference_url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465"},{"reference_url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html"},{"reference_url":"http://osvdb.org/32086","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/32086"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6103.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6103","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13801","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13857","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13775","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103"},{"reference_url":"http://secunia.com/advisories/23633","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23633"},{"reference_url":"http://secunia.com/advisories/23670","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23670"},{"reference_url":"http://secunia.com/advisories/23684","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23684"},{"reference_url":"http://secunia.com/advisories/23689","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23689"},{"reference_url":"http://secunia.com/advisories/23698","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23698"},{"reference_url":"http://secunia.com/advisories/23705","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23705"},{"reference_url":"http://secunia.com/advisories/23758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23758"},{"reference_url":"http://secunia.com/advisories/23789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23789"},{"reference_url":"http://secunia.com/advisories/23966","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23966"},{"reference_url":"http://secunia.com/advisories/24168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24168"},{"reference_url":"http://secunia.com/advisories/24210","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24210"},{"reference_url":"http://secunia.com/advisories/24247","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24247"},{"reference_url":"http://secunia.com/advisories/24401","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24401"},{"reference_url":"http://secunia.com/advisories/25802","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25802"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200701-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200701-25.xml"},{"reference_url":"http://securitytracker.com/id?1017495","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017495"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31379","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31379"},{"reference_url":"https://issues.rpath.com/browse/RPL-920","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-920"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm"},{"reference_url":"https://www.debian.org/security/2007/dsa-1249","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2007/dsa-1249"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_08_x.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_08_x.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html"},{"reference_url":"http://www.securityfocus.com/bid/21968","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21968"},{"reference_url":"http://www.ubuntu.com/usn/usn-403-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-403-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0108","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0108"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0109","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0109"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0589","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0589"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0669","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0669"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2233","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618240","reference_id":"1618240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618240"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6103","reference_id":"CVE-2006-6103","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6103"},{"reference_url":"https://security.gentoo.org/glsa/200701-25","reference_id":"GLSA-200701-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200701-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0002","reference_id":"RHSA-2007:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0003","reference_id":"RHSA-2007:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0003"},{"reference_url":"https://usn.ubuntu.com/403-1/","reference_id":"USN-403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943537?format=json","purl":"pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2006-6103"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwwx-h1zr-x7gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32172?format=json","vulnerability_id":"VCID-n95v-qmcg-6bek","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18216","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18369","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258","reference_id":"1862258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986","reference_id":"968986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986"},{"reference_url":"https://security.archlinux.org/AVG-1211","reference_id":"AVG-1211","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1211"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943562?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14347"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n95v-qmcg-6bek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39712?format=json","vulnerability_id":"VCID-nbdz-scr3-hbhv","summary":"Multiple vulnerabilities have been found in X.Org Server, the worst\n    of which could allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12176","reference_id":"","reference_type":"","scores":[{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.7645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0095","scoring_system":"epss","scoring_elements":"0.76411","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509214","reference_id":"1509214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509214"},{"reference_url":"https://security.archlinux.org/ASA-201710-29","reference_id":"ASA-201710-29","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-29"},{"reference_url":"https://security.archlinux.org/AVG-443","reference_id":"AVG-443","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-443"},{"reference_url":"https://security.gentoo.org/glsa/201711-05","reference_id":"GLSA-201711-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-05"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12176"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nbdz-scr3-hbhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87811?format=json","vulnerability_id":"VCID-njkq-ar3p-9fa8","summary":"Xorg: X server Render extension memory corruption","references":[{"reference_url":"http://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1166.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1166","reference_id":"","reference_type":"","scores":[{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.8784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87843","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87871","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87876","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87875","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87889","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.87903","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03655","scoring_system":"epss","scoring_elements":"0.8791","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495733","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495733"},{"reference_url":"http://secunia.com/advisories/39650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39650"},{"reference_url":"http://secunia.com/advisories/39834","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39834"},{"reference_url":"http://securitytracker.com/id?1023929","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1023929"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10112","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10112"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0382.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0382.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-939-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-939-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1185","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1185"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=582601","reference_id":"582601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=582601"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x.org:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1166","reference_id":"CVE-2010-1166","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0382","reference_id":"RHSA-2010:0382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0382"},{"reference_url":"https://usn.ubuntu.com/939-1/","reference_id":"USN-939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/939-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943545?format=json","purl":"pkg:deb/debian/xorg-server@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2010-1166"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njkq-ar3p-9fa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41630?format=json","vulnerability_id":"VCID-nzdk-7j9y-pkgw","summary":"Multiple vulnerabilities have been discovered in the X.Org X server and\n    Xfont library, allowing for a local privilege escalation and arbitrary code\n    execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6428.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6428.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6428","reference_id":"","reference_type":"","scores":[{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87292","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87311","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87318","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.8732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87339","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.8735","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0335","scoring_system":"epss","scoring_elements":"0.87359","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=413791","reference_id":"413791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=413791"},{"reference_url":"https://security.gentoo.org/glsa/200801-09","reference_id":"GLSA-200801-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0029","reference_id":"RHSA-2008:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0030","reference_id":"RHSA-2008:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0031","reference_id":"RHSA-2008:0031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0031"},{"reference_url":"https://usn.ubuntu.com/571-1/","reference_id":"USN-571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943542?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-6428"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nzdk-7j9y-pkgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62244?format=json","vulnerability_id":"VCID-p1qr-w7cs-bqcy","summary":"Sean Larsson from iDefense Labs has found multiple vulnerabilities in the\n    DBE and Render extensions.","references":[{"reference_url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=464","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=464"},{"reference_url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html"},{"reference_url":"http://osvdb.org/32085","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/32085"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6102.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6102","reference_id":"","reference_type":"","scores":[{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91091","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91031","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.9105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91082","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06429","scoring_system":"epss","scoring_elements":"0.91096","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102"},{"reference_url":"http://secunia.com/advisories/23633","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23633"},{"reference_url":"http://secunia.com/advisories/23670","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23670"},{"reference_url":"http://secunia.com/advisories/23684","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23684"},{"reference_url":"http://secunia.com/advisories/23689","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23689"},{"reference_url":"http://secunia.com/advisories/23698","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23698"},{"reference_url":"http://secunia.com/advisories/23705","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23705"},{"reference_url":"http://secunia.com/advisories/23758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23758"},{"reference_url":"http://secunia.com/advisories/23789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23789"},{"reference_url":"http://secunia.com/advisories/23966","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23966"},{"reference_url":"http://secunia.com/advisories/24168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24168"},{"reference_url":"http://secunia.com/advisories/24210","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24210"},{"reference_url":"http://secunia.com/advisories/24247","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24247"},{"reference_url":"http://secunia.com/advisories/24401","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24401"},{"reference_url":"http://secunia.com/advisories/25802","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25802"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200701-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200701-25.xml"},{"reference_url":"http://securitytracker.com/id?1017495","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017495"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31376","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31376"},{"reference_url":"https://issues.rpath.com/browse/RPL-920","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-920"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm"},{"reference_url":"https://www.debian.org/security/2007/dsa-1249","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2007/dsa-1249"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_08_x.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_08_x.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html"},{"reference_url":"http://www.securityfocus.com/bid/21968","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21968"},{"reference_url":"http://www.ubuntu.com/usn/usn-403-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-403-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0108","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0108"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0109","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0109"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0589","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0589"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0669","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0669"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2233","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618239","reference_id":"1618239","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618239"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86_x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:xfree86_x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86_x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6102","reference_id":"CVE-2006-6102","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6102"},{"reference_url":"https://security.gentoo.org/glsa/200701-25","reference_id":"GLSA-200701-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200701-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0002","reference_id":"RHSA-2007:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0003","reference_id":"RHSA-2007:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0003"},{"reference_url":"https://usn.ubuntu.com/403-1/","reference_id":"USN-403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943537?format=json","purl":"pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2006-6102"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p1qr-w7cs-bqcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41831?format=json","vulnerability_id":"VCID-p1tf-2c6u-tygr","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31080","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31424","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31456","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271997","reference_id":"2271997","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271997"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31080","reference_id":"CVE-2024-31080","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31080"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1785","reference_id":"RHSA-2024:1785","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2036","reference_id":"RHSA-2024:2036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2037","reference_id":"RHSA-2024:2037","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2038","reference_id":"RHSA-2024:2038","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2039","reference_id":"RHSA-2024:2039","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2040","reference_id":"RHSA-2024:2040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2041","reference_id":"RHSA-2024:2041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2042","reference_id":"RHSA-2024:2042","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2080","reference_id":"RHSA-2024:2080","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2616","reference_id":"RHSA-2024:2616","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3258","reference_id":"RHSA-2024:3258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3261","reference_id":"RHSA-2024:3261","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3343","reference_id":"RHSA-2024:3343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9093","reference_id":"RHSA-2024:9093","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9122","reference_id":"RHSA-2024:9122","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943589?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943590?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-31080"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p1tf-2c6u-tygr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91506?format=json","vulnerability_id":"VCID-p4ym-jqrt-s7fj","summary":"X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0745","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39097","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39307","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39271","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39305","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39187","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38975","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38957","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38875","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0745"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378465","reference_id":"378465","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378465"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1596.txt","reference_id":"OSVDB-24000;CVE-2006-0745","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1596.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943531?format=json","purl":"pkg:deb/debian/xorg-server@1:1.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@1:1.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2006-0745"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p4ym-jqrt-s7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267382?format=json","vulnerability_id":"VCID-pa9n-ntq3-jqaz","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34003.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34003.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-34003","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01752","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01747","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-34003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34003"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451113","reference_id":"2451113","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451113"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2026-34003","reference_id":"CVE-2026-34003","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2026-34003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10739","reference_id":"RHSA-2026:10739","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:10739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11352","reference_id":"RHSA-2026:11352","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11369","reference_id":"RHSA-2026:11369","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11388","reference_id":"RHSA-2026:11388","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11656","reference_id":"RHSA-2026:11656","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11692","reference_id":"RHSA-2026:11692","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-34003"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pa9n-ntq3-jqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32171?format=json","vulnerability_id":"VCID-pcn1-ehd2-g3f7","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38073","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37678","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246","reference_id":"1862246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943562?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14346"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcn1-ehd2-g3f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49327?format=json","vulnerability_id":"VCID-phkz-t2yr-m7em","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6816","reference_id":"","reference_type":"","scores":[{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03015","scoring_system":"epss","scoring_elements":"0.86642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87156","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03264","scoring_system":"epss","scoring_elements":"0.87167","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257691","reference_id":"2257691","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257691"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-6816","reference_id":"CVE-2023-6816","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-6816"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943587?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943586?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943588?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-6816"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-phkz-t2yr-m7em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32173?format=json","vulnerability_id":"VCID-psr2-gkpa-z7fj","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28417","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28343","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139","reference_id":"1869139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943563?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14360"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psr2-gkpa-z7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41477?format=json","vulnerability_id":"VCID-q8jj-uwq7-qubk","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2624","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14333","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14418","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14485","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14337","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14173","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1417","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14241","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1424984","reference_id":"1424984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1424984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398","reference_id":"856398","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398"},{"reference_url":"https://security.gentoo.org/glsa/201704-03","reference_id":"GLSA-201704-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-03"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://usn.ubuntu.com/3362-1/","reference_id":"USN-3362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3362-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943560?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-2624"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8jj-uwq7-qubk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47297?format=json","vulnerability_id":"VCID-q8sq-vkr5-2ba5","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2362.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2362","reference_id":"","reference_type":"","scores":[{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.84034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83935","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.8398","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83974","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.8397","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.84023","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.8403","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020245","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020245"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29670","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29670"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=448785","reference_id":"448785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=448785"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2362","reference_id":"CVE-2008-2362","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2362"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943543?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-2362"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8sq-vkr5-2ba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41628?format=json","vulnerability_id":"VCID-qh1y-8a6m-c7dv","summary":"Multiple vulnerabilities have been discovered in the X.Org X server and\n    Xfont library, allowing for a local privilege escalation and arbitrary code\n    execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5958.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5958.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5958","reference_id":"","reference_type":"","scores":[{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87737","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87739","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.8776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87772","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87784","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87805","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03599","scoring_system":"epss","scoring_elements":"0.87803","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5958"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=391841","reference_id":"391841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=391841"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5152.sh","reference_id":"CVE-2007-5958","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5152.sh"},{"reference_url":"https://security.gentoo.org/glsa/200801-09","reference_id":"GLSA-200801-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0029","reference_id":"RHSA-2008:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0030","reference_id":"RHSA-2008:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0031","reference_id":"RHSA-2008:0031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0031"},{"reference_url":"https://usn.ubuntu.com/571-1/","reference_id":"USN-571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943542?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-5958"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qh1y-8a6m-c7dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59262?format=json","vulnerability_id":"VCID-qwqu-19wq-1ke8","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26594","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18539","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906","reference_id":"1098906","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907","reference_id":"1098907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345248","reference_id":"2345248","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345248"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26594","reference_id":"CVE-2025-26594","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26594"},{"reference_url":"https://security.gentoo.org/glsa/202506-04","reference_id":"GLSA-202506-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2500","reference_id":"RHSA-2025:2500","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2502","reference_id":"RHSA-2025:2502","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2861","reference_id":"RHSA-2025:2861","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2862","reference_id":"RHSA-2025:2862","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2865","reference_id":"RHSA-2025:2865","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2866","reference_id":"RHSA-2025:2866","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2873","reference_id":"RHSA-2025:2873","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2874","reference_id":"RHSA-2025:2874","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2875","reference_id":"RHSA-2025:2875","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2879","reference_id":"RHSA-2025:2879","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2880","reference_id":"RHSA-2025:2880","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3976","reference_id":"RHSA-2025:3976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7163","reference_id":"RHSA-2025:7163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7165","reference_id":"RHSA-2025:7165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7458","reference_id":"RHSA-2025:7458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"reference_url":"https://usn.ubuntu.com/7299-1/","reference_id":"USN-7299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-1/"},{"reference_url":"https://usn.ubuntu.com/7299-2/","reference_id":"USN-7299-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-2/"},{"reference_url":"https://usn.ubuntu.com/7299-4/","reference_id":"USN-7299-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7299-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943595?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943594?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943596?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26594"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqu-19wq-1ke8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88166?format=json","vulnerability_id":"VCID-r4u8-s2mv-qfcn","summary":"xvfb-run insecurely displays mcookie value","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1573.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1573","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21228","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20942","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21082","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2084","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20808","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=499234","reference_id":"499234","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=499234"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526678","reference_id":"526678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526678"},{"reference_url":"https://usn.ubuntu.com/939-1/","reference_id":"USN-939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/939-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943544?format=json","purl":"pkg:deb/debian/xorg-server@2:1.6.1.901-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.6.1.901-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2009-1573"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4u8-s2mv-qfcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69420?format=json","vulnerability_id":"VCID-s7xs-zcxk-nyc7","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49179","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3612","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3582","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35787","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369978","reference_id":"2369978","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369978"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4","reference_id":"2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49179","reference_id":"CVE-2025-49179","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943598?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943597?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943599?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-49179"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s7xs-zcxk-nyc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69416?format=json","vulnerability_id":"VCID-sfgy-e6d6-f3fd","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49175","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2423","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38891","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44904","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee","reference_id":"0885e0b26225c90534642fe911632ec0779eebee","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024","reference_id":"2024","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369947","reference_id":"2369947","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369947"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49175","reference_id":"CVE-2025-49175","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943598?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943597?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943599?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-49175"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sfgy-e6d6-f3fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32006?format=json","vulnerability_id":"VCID-sju7-ms24-wff1","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610","reference_id":"","reference_type":"","scores":[],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/3610"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8093","reference_id":"","reference_type":"","scores":[{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79763","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7977","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71596","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71596"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168688","reference_id":"1168688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168688"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8093","reference_id":"CVE-2014-8093","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8093"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8093"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sju7-ms24-wff1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32012?format=json","vulnerability_id":"VCID-str7-xe4q-6fek","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8099","reference_id":"","reference_type":"","scores":[{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.7995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79996","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80016","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.8","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80022","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.8005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80055","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.securityfocus.com/bid/71600","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71600"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168710","reference_id":"1168710","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168710"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8099","reference_id":"CVE-2014-8099","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8099"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8099"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-str7-xe4q-6fek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41627?format=json","vulnerability_id":"VCID-suyj-bttx-gudj","summary":"Multiple vulnerabilities have been discovered in the X.Org X server and\n    Xfont library, allowing for a local privilege escalation and arbitrary code\n    execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5760.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5760","reference_id":"","reference_type":"","scores":[{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89009","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89082","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04445","scoring_system":"epss","scoring_elements":"0.89092","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=414031","reference_id":"414031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=414031"},{"reference_url":"https://security.gentoo.org/glsa/200801-09","reference_id":"GLSA-200801-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0030","reference_id":"RHSA-2008:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0031","reference_id":"RHSA-2008:0031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0031"},{"reference_url":"https://usn.ubuntu.com/571-1/","reference_id":"USN-571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943542?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-5760"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-suyj-bttx-gudj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66663?format=json","vulnerability_id":"VCID-sx54-5s5r-ckg2","summary":"xorg: xwayland: Use-after-free in Xkb client resource removal","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62230","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01913","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01982","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0089","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00892","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00895","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00898","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html","reference_id":"003635.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402653","reference_id":"2402653","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402653"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-62230","reference_id":"CVE-2025-62230","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-62230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19432","reference_id":"RHSA-2025:19432","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19433","reference_id":"RHSA-2025:19433","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19434","reference_id":"RHSA-2025:19434","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19435","reference_id":"RHSA-2025:19435","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19489","reference_id":"RHSA-2025:19489","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19623","reference_id":"RHSA-2025:19623","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19909","reference_id":"RHSA-2025:19909","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20958","reference_id":"RHSA-2025:20958","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20960","reference_id":"RHSA-2025:20960","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20961","reference_id":"RHSA-2025:20961","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21035","reference_id":"RHSA-2025:21035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22040","reference_id":"RHSA-2025:22040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22041","reference_id":"RHSA-2025:22041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22051","reference_id":"RHSA-2025:22051","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22055","reference_id":"RHSA-2025:22055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22056","reference_id":"RHSA-2025:22056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22077","reference_id":"RHSA-2025:22077","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22096","reference_id":"RHSA-2025:22096","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22164","reference_id":"RHSA-2025:22164","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22167","reference_id":"RHSA-2025:22167","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22364","reference_id":"RHSA-2025:22364","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22365","reference_id":"RHSA-2025:22365","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22426","reference_id":"RHSA-2025:22426","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22427","reference_id":"RHSA-2025:22427","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22667","reference_id":"RHSA-2025:22667","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22729","reference_id":"RHSA-2025:22729","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22742","reference_id":"RHSA-2025:22742","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22753","reference_id":"RHSA-2025:22753","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0031","reference_id":"RHSA-2026:0031","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0033","reference_id":"RHSA-2026:0033","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0034","reference_id":"RHSA-2026:0034","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0035","reference_id":"RHSA-2026:0035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0036","reference_id":"RHSA-2026:0036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0036"},{"reference_url":"https://usn.ubuntu.com/7846-1/","reference_id":"USN-7846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943601?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u17%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943602?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.20-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-62230"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sx54-5s5r-ckg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66664?format=json","vulnerability_id":"VCID-t1cy-srre-nkbp","summary":"xorg: xmayland: Value overflow in XkbSetCompatMap()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62231","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01913","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01982","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0089","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00892","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00895","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00898","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-62231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html","reference_id":"003635.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2025-October/003635.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402660","reference_id":"2402660","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402660"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-62231","reference_id":"CVE-2025-62231","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-62231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19432","reference_id":"RHSA-2025:19432","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19433","reference_id":"RHSA-2025:19433","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19434","reference_id":"RHSA-2025:19434","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19435","reference_id":"RHSA-2025:19435","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19489","reference_id":"RHSA-2025:19489","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19623","reference_id":"RHSA-2025:19623","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19909","reference_id":"RHSA-2025:19909","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20958","reference_id":"RHSA-2025:20958","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20960","reference_id":"RHSA-2025:20960","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20961","reference_id":"RHSA-2025:20961","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21035","reference_id":"RHSA-2025:21035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22040","reference_id":"RHSA-2025:22040","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22041","reference_id":"RHSA-2025:22041","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22051","reference_id":"RHSA-2025:22051","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22055","reference_id":"RHSA-2025:22055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22056","reference_id":"RHSA-2025:22056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22077","reference_id":"RHSA-2025:22077","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22096","reference_id":"RHSA-2025:22096","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22164","reference_id":"RHSA-2025:22164","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22167","reference_id":"RHSA-2025:22167","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22364","reference_id":"RHSA-2025:22364","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22365","reference_id":"RHSA-2025:22365","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22426","reference_id":"RHSA-2025:22426","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22427","reference_id":"RHSA-2025:22427","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22667","reference_id":"RHSA-2025:22667","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22729","reference_id":"RHSA-2025:22729","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22742","reference_id":"RHSA-2025:22742","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22753","reference_id":"RHSA-2025:22753","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0031","reference_id":"RHSA-2026:0031","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0033","reference_id":"RHSA-2026:0033","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0034","reference_id":"RHSA-2026:0034","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0035","reference_id":"RHSA-2026:0035","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0036","reference_id":"RHSA-2026:0036","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0036"},{"reference_url":"https://usn.ubuntu.com/7846-1/","reference_id":"USN-7846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943601?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u17%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943602?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.20-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-62231"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1cy-srre-nkbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32004?format=json","vulnerability_id":"VCID-tame-fxrq-qfa7","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8091","reference_id":"","reference_type":"","scores":[{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.8952","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89531","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89551","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71597","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71597"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168680","reference_id":"1168680","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168680"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8091","reference_id":"CVE-2014-8091","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8091"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"},{"reference_url":"https://usn.ubuntu.com/2438-1/","reference_id":"USN-2438-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2438-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8091"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tame-fxrq-qfa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56897?format=json","vulnerability_id":"VCID-tmht-8fhj-uue1","summary":"Multiple vulnerabilities have been reported in libXfont and TightVNC,\n    allowing for the execution of arbitrary code with root privileges.","references":[{"reference_url":"http://issues.foresightlinux.org/browse/FL-223","reference_id":"","reference_type":"","scores":[],"url":"http://issues.foresightlinux.org/browse/FL-223"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503"},{"reference_url":"http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0125.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0125.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1003.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1003.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1003","reference_id":"","reference_type":"","scores":[{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92115","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92071","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92085","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.9211","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92114","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08011","scoring_system":"epss","scoring_elements":"0.92113","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003"},{"reference_url":"http://secunia.com/advisories/24741","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24741"},{"reference_url":"http://secunia.com/advisories/24745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24745"},{"reference_url":"http://secunia.com/advisories/24756","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24756"},{"reference_url":"http://secunia.com/advisories/24758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24758"},{"reference_url":"http://secunia.com/advisories/24765","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24765"},{"reference_url":"http://secunia.com/advisories/24770","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24770"},{"reference_url":"http://secunia.com/advisories/24771","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24771"},{"reference_url":"http://secunia.com/advisories/24772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24772"},{"reference_url":"http://secunia.com/advisories/24791","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24791"},{"reference_url":"http://secunia.com/advisories/25004","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25004"},{"reference_url":"http://secunia.com/advisories/25006","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25006"},{"reference_url":"http://secunia.com/advisories/25195","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25195"},{"reference_url":"http://secunia.com/advisories/25216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25216"},{"reference_url":"http://secunia.com/advisories/25305","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25305"},{"reference_url":"http://secunia.com/advisories/29622","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29622"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-10.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33424","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33424"},{"reference_url":"https://issues.rpath.com/browse/RPL-1213","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1213"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1294","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1294"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:079","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:080","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:080"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_27_x.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_27_x.html"},{"reference_url":"http://www.openbsd.org/errata39.html#021_xorg","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata39.html#021_xorg"},{"reference_url":"http://www.openbsd.org/errata40.html#011_xorg","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata40.html#011_xorg"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0126.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0126.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0127.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0127.html"},{"reference_url":"http://www.securityfocus.com/archive/1/464686/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464686/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464816/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464816/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/23284","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23284"},{"reference_url":"http://www.securityfocus.com/bid/23300","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23300"},{"reference_url":"http://www.securitytracker.com/id?1017857","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017857"},{"reference_url":"http://www.ubuntu.com/usn/usn-448-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-448-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1217","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1217"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1548","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1548"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=235263","reference_id":"235263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=235263"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1003","reference_id":"CVE-2007-1003","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1003"},{"reference_url":"https://security.gentoo.org/glsa/200705-10","reference_id":"GLSA-200705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0125","reference_id":"RHSA-2007:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0126","reference_id":"RHSA-2007:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0127","reference_id":"RHSA-2007:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0127"},{"reference_url":"https://usn.ubuntu.com/448-1/","reference_id":"USN-448-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/448-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943538?format=json","purl":"pkg:deb/debian/xorg-server@2:1.1.1-21?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-21%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-1003"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmht-8fhj-uue1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34790?format=json","vulnerability_id":"VCID-tngq-27px-w7cm","summary":"A vulnerability in X.Org X Server allows local users to escalate\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14665","reference_id":"","reference_type":"","scores":[{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92554","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92606","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.9261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.9256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92567","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08941","scoring_system":"epss","scoring_elements":"0.92604","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1637761","reference_id":"1637761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1637761"},{"reference_url":"https://security.archlinux.org/ASA-201810-15","reference_id":"ASA-201810-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201810-15"},{"reference_url":"https://security.archlinux.org/AVG-788","reference_id":"AVG-788","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-788"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb"},{"reference_url":"https://twitter.com/hackerfantastic/status/1055517801224396800","reference_id":"CVE-2018-14665","reference_type":"exploit","scores":[],"url":"https://twitter.com/hackerfantastic/status/1055517801224396800"},{"reference_url":"https://security.gentoo.org/glsa/201810-09","reference_id":"GLSA-201810-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3410","reference_id":"RHSA-2018:3410","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3410"},{"reference_url":"https://usn.ubuntu.com/3802-1/","reference_id":"USN-3802-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3802-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943561?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2018-14665"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tngq-27px-w7cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48128?format=json","vulnerability_id":"VCID-tp4n-mkmn-y7a6","summary":"Multiple vulnerabilities in the X.Org X server might allow local\n    attackers to disclose information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4029.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4029","reference_id":"","reference_type":"","scores":[{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73406","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73429","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73401","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73438","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.7349","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73536","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=745024","reference_id":"745024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=745024"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18040.c","reference_id":"CVE-2011-4613;OSVDB-84058;CVE-2011-4029;OSVDB-76669","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18040.c"},{"reference_url":"https://security.gentoo.org/glsa/201110-19","reference_id":"GLSA-201110-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0939","reference_id":"RHSA-2012:0939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0939"},{"reference_url":"https://usn.ubuntu.com/1232-1/","reference_id":"USN-1232-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1232-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943548?format=json","purl":"pkg:deb/debian/xorg-server@2:1.11.1.901-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.11.1.901-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2011-4029"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tp4n-mkmn-y7a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49325?format=json","vulnerability_id":"VCID-trsp-u7xt-a3ck","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6377","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60023","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60018","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61461","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61418","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253291","reference_id":"2253291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253291"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7886","reference_id":"RHSA-2023:7886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0006","reference_id":"RHSA-2024:0006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0009","reference_id":"RHSA-2024:0009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0010","reference_id":"RHSA-2024:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0014","reference_id":"RHSA-2024:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0015","reference_id":"RHSA-2024:0015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0016","reference_id":"RHSA-2024:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0017","reference_id":"RHSA-2024:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0018","reference_id":"RHSA-2024:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0020","reference_id":"RHSA-2024:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13998","reference_id":"RHSA-2025:13998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13998"},{"reference_url":"https://usn.ubuntu.com/6555-1/","reference_id":"USN-6555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-1/"},{"reference_url":"https://usn.ubuntu.com/6555-2/","reference_id":"USN-6555-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943582?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943581?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943583?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-6377"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trsp-u7xt-a3ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32016?format=json","vulnerability_id":"VCID-tz65-cx8m-g3e5","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8103","reference_id":"","reference_type":"","scores":[{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82669","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82744","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01787","scoring_system":"epss","scoring_elements":"0.82809","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168716","reference_id":"1168716","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168716"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8103","reference_id":"CVE-2014-8103","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8103"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8103"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tz65-cx8m-g3e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49323?format=json","vulnerability_id":"VCID-un9v-4svv-2baj","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5367","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20029","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19906","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19764","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243091","reference_id":"2243091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243091"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6802","reference_id":"RHSA-2023:6802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6808","reference_id":"RHSA-2023:6808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7373","reference_id":"RHSA-2023:7373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7388","reference_id":"RHSA-2023:7388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7405","reference_id":"RHSA-2023:7405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7405"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7428","reference_id":"RHSA-2023:7428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7436","reference_id":"RHSA-2023:7436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7526","reference_id":"RHSA-2023:7526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7533","reference_id":"RHSA-2023:7533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0010","reference_id":"RHSA-2024:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0128","reference_id":"RHSA-2024:0128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6453-1/","reference_id":"USN-6453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-1/"},{"reference_url":"https://usn.ubuntu.com/6453-2/","reference_id":"USN-6453-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6453-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943579?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943578?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943580?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-5367"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-un9v-4svv-2baj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46301?format=json","vulnerability_id":"VCID-uxsy-k3cg-mkdd","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46343","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7881","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071","reference_id":"1026071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151758","reference_id":"2151758","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151758"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","reference_id":"5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-46343","reference_id":"CVE-2022-46343","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-46343"},{"reference_url":"https://www.debian.org/security/2022/dsa-5304","reference_id":"dsa-5304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://www.debian.org/security/2022/dsa-5304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","reference_id":"DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0045","reference_id":"RHSA-2023:0045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0046","reference_id":"RHSA-2023:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2257","reference_id":"RHSA-2023:2257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2830","reference_id":"RHSA-2023:2830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-1/","reference_id":"USN-5778-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-1/"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","reference_id":"Z67QC4C3I2FI2WRFIUPEHKC36J362MLA","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943572?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943571?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2022-46343"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41833?format=json","vulnerability_id":"VCID-v2jb-vhek-fkcz","summary":"A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31082","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09653","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0968","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09587","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09548","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09635","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2024-April/003497.html","reference_id":"003497.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2024-April/003497.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271999","reference_id":"2271999","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271999"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-31082","reference_id":"CVE-2024-31082","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-31082"},{"reference_url":"https://security.gentoo.org/glsa/202411-08","reference_id":"GLSA-202411-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-08"},{"reference_url":"https://usn.ubuntu.com/6721-1/","reference_id":"USN-6721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943589?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943590?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-31082"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v2jb-vhek-fkcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32010?format=json","vulnerability_id":"VCID-v6yp-dquj-6bhh","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8097","reference_id":"","reference_type":"","scores":[{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.79763","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01297","scoring_system":"epss","scoring_elements":"0.7977","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71604","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71604"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168705","reference_id":"1168705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168705"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8097","reference_id":"CVE-2014-8097","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8097"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8097"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6yp-dquj-6bhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41476?format=json","vulnerability_id":"VCID-v8w1-zu65-c7ac","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13723","reference_id":"","reference_type":"","scores":[{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3309","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3317","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33505","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33425","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33364","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13723"},{"reference_url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac","reference_id":"","reference_type":"","scores":[],"url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:C"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.x.org/archives/xorg-announce/2017-October/002808.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4000"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/10/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/10/04/10"},{"reference_url":"http://www.securityfocus.com/bid/101253","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101253"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500388","reference_id":"1500388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500388"},{"reference_url":"https://security.archlinux.org/ASA-201710-10","reference_id":"ASA-201710-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-10"},{"reference_url":"https://security.archlinux.org/AVG-432","reference_id":"AVG-432","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-432"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13723","reference_id":"CVE-2017-13723","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13723"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://usn.ubuntu.com/3453-1/","reference_id":"USN-3453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943559?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-13723"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v8w1-zu65-c7ac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49331?format=json","vulnerability_id":"VCID-v9p1-8sb6-9ufr","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21885","reference_id":"","reference_type":"","scores":[{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.4698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49293","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49296","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256540","reference_id":"2256540","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256540"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client","reference_id":"cpe:/o:redhat:enterprise_linux:7::client","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode","reference_id":"cpe:/o:redhat:enterprise_linux:7::computenode","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server","reference_id":"cpe:/o:redhat:enterprise_linux:7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation","reference_id":"cpe:/o:redhat:enterprise_linux:7::workstation","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-21885","reference_id":"CVE-2024-21885","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-21885"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0320","reference_id":"RHSA-2024:0320","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0557","reference_id":"RHSA-2024:0557","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0558","reference_id":"RHSA-2024:0558","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0597","reference_id":"RHSA-2024:0597","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0607","reference_id":"RHSA-2024:0607","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0614","reference_id":"RHSA-2024:0614","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0617","reference_id":"RHSA-2024:0617","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0621","reference_id":"RHSA-2024:0621","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0626","reference_id":"RHSA-2024:0626","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0629","reference_id":"RHSA-2024:0629","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6587-1/","reference_id":"USN-6587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-1/"},{"reference_url":"https://usn.ubuntu.com/6587-2/","reference_id":"USN-6587-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943587?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943586?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943588?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2024-21885"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v9p1-8sb6-9ufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32009?format=json","vulnerability_id":"VCID-vkq6-6h66-pubm","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8096","reference_id":"","reference_type":"","scores":[{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77233","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77083","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.771","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.7717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77185","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77186","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01014","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71598","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71598"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168700","reference_id":"1168700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168700"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8096","reference_id":"CVE-2014-8096","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8096"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8096"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vkq6-6h66-pubm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47295?format=json","vulnerability_id":"VCID-vtxx-3wd9-x7hz","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2360.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2360","reference_id":"","reference_type":"","scores":[{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83279","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.8341","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83417","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30628"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020243","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020243"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=448783","reference_id":"448783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=448783"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2360","reference_id":"CVE-2008-2360","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2360"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0512","reference_id":"RHSA-2008:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0512"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943543?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-2360"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vtxx-3wd9-x7hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32005?format=json","vulnerability_id":"VCID-vzmd-vvau-wbf5","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8092","reference_id":"","reference_type":"","scores":[{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79627","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79633","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.7967","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79737","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102"},{"reference_url":"http://secunia.com/advisories/61947","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61947"},{"reference_url":"http://secunia.com/advisories/62292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62292"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2014/dsa-3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.securityfocus.com/bid/71595","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71595"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168684","reference_id":"1168684","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168684"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8092","reference_id":"CVE-2014-8092","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8092"},{"reference_url":"https://security.gentoo.org/glsa/201504-06","reference_id":"GLSA-201504-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1982","reference_id":"RHSA-2014:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1983","reference_id":"RHSA-2014:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1983"},{"reference_url":"https://usn.ubuntu.com/2436-1/","reference_id":"USN-2436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943554?format=json","purl":"pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8092"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzmd-vvau-wbf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46303?format=json","vulnerability_id":"VCID-wh9v-35ju-vbcb","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0494","reference_id":"","reference_type":"","scores":[{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69831","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72341","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72292","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72304","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.x.org/archives/xorg-announce/2023-February/003320.html","reference_id":"003320.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://lists.x.org/archives/xorg-announce/2023-February/003320.html"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec","reference_id":"0ba6d8c37071131a49790243cdac55392ecf71ec","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777","reference_id":"1030777","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165995","reference_id":"2165995","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165995"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0622","reference_id":"RHSA-2023:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0623","reference_id":"RHSA-2023:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0662","reference_id":"RHSA-2023:0662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0663","reference_id":"RHSA-2023:0663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0664","reference_id":"RHSA-2023:0664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0665","reference_id":"RHSA-2023:0665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0671","reference_id":"RHSA-2023:0671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0675","reference_id":"RHSA-2023:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2248","reference_id":"RHSA-2023:2248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2249","reference_id":"RHSA-2023:2249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2805","reference_id":"RHSA-2023:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2806","reference_id":"RHSA-2023:2806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/5778-2/","reference_id":"USN-5778-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5778-2/"},{"reference_url":"https://usn.ubuntu.com/5846-1/","reference_id":"USN-5846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5846-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943575?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943574?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-0494"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wh9v-35ju-vbcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41473?format=json","vulnerability_id":"VCID-wjbk-4mjq-ybab","summary":"Multiple vulnerabilities have been found in X.Org Server the worst\n    of which could allow a local attacker to replace shared memory segments.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6424","reference_id":"","reference_type":"","scores":[{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.9134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91347","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.9135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91384","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0684","scoring_system":"epss","scoring_elements":"0.91382","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1037984","reference_id":"1037984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1037984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922","reference_id":"742922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922"},{"reference_url":"https://security.gentoo.org/glsa/201701-64","reference_id":"GLSA-201701-64","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-64"},{"reference_url":"https://security.gentoo.org/glsa/201710-30","reference_id":"GLSA-201710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1868","reference_id":"RHSA-2013:1868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1868"},{"reference_url":"https://usn.ubuntu.com/2500-1/","reference_id":"USN-2500-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2500-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943553?format=json","purl":"pkg:deb/debian/xorg-server@2:1.14.2.901-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.14.2.901-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6424"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wjbk-4mjq-ybab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46305?format=json","vulnerability_id":"VCID-wp8b-r6p1-7kcf","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1393","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23801","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23841","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2586","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25908","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/03/29/1","reference_id":"1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/03/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180288","reference_id":"2180288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180288"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110","reference_id":"26ef545b3502f61ca722a7a3373507e88ef64110","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/","reference_id":"BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/","reference_id":"H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/","reference_id":"MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/","reference_id":"NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/","reference_id":"PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/","reference_id":"QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1548","reference_id":"RHSA-2023:1548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1549","reference_id":"RHSA-2023:1549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1551","reference_id":"RHSA-2023:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1592","reference_id":"RHSA-2023:1592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1594","reference_id":"RHSA-2023:1594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1598","reference_id":"RHSA-2023:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1599","reference_id":"RHSA-2023:1599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1600","reference_id":"RHSA-2023:1600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6340","reference_id":"RHSA-2023:6340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6341","reference_id":"RHSA-2023:6341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6916","reference_id":"RHSA-2023:6916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6917","reference_id":"RHSA-2023:6917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/","reference_id":"SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/","reference_id":"SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/"},{"reference_url":"https://usn.ubuntu.com/5986-1/","reference_id":"USN-5986-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5986-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943577?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943576?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-1393"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wp8b-r6p1-7kcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32177?format=json","vulnerability_id":"VCID-wq4p-h17p-fyf4","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33035","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276","reference_id":"1887276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943563?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2020-25712"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wq4p-h17p-fyf4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69417?format=json","vulnerability_id":"VCID-wyuw-13t9-rbg1","summary":"xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49176","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2423","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44752","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9","reference_id":"03731b326a80b582e48d939fe62cb1e2b10400d9","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073","reference_id":"1108073","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369","reference_id":"1108369","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369954","reference_id":"2369954","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369954"},{"reference_url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1","reference_id":"4fc4d76b2c7aaed61ed2653f997783a3714c4fe1","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.4::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server","reference_id":"cpe:/o:redhat:rhel_aus:7.7::server","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6","reference_id":"cpe:/o:redhat:rhel_els:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-49176","reference_id":"CVE-2025-49176","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-49176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10258","reference_id":"RHSA-2025:10258","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10342","reference_id":"RHSA-2025:10342","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10343","reference_id":"RHSA-2025:10343","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10344","reference_id":"RHSA-2025:10344","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10346","reference_id":"RHSA-2025:10346","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10347","reference_id":"RHSA-2025:10347","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10348","reference_id":"RHSA-2025:10348","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10349","reference_id":"RHSA-2025:10349","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10350","reference_id":"RHSA-2025:10350","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10351","reference_id":"RHSA-2025:10351","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10352","reference_id":"RHSA-2025:10352","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10355","reference_id":"RHSA-2025:10355","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10356","reference_id":"RHSA-2025:10356","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10360","reference_id":"RHSA-2025:10360","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10370","reference_id":"RHSA-2025:10370","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10374","reference_id":"RHSA-2025:10374","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10375","reference_id":"RHSA-2025:10375","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10376","reference_id":"RHSA-2025:10376","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10377","reference_id":"RHSA-2025:10377","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10378","reference_id":"RHSA-2025:10378","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10381","reference_id":"RHSA-2025:10381","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10410","reference_id":"RHSA-2025:10410","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:10410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9303","reference_id":"RHSA-2025:9303","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9304","reference_id":"RHSA-2025:9304","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9305","reference_id":"RHSA-2025:9305","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9306","reference_id":"RHSA-2025:9306","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9392","reference_id":"RHSA-2025:9392","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9964","reference_id":"RHSA-2025:9964","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9964"},{"reference_url":"https://www.x.org/wiki/Development/Security/","reference_id":"Security","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/"}],"url":"https://www.x.org/wiki/Development/Security/"},{"reference_url":"https://usn.ubuntu.com/7573-1/","reference_id":"USN-7573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-1/"},{"reference_url":"https://usn.ubuntu.com/7573-2/","reference_id":"USN-7573-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7573-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943598?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943597?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943600?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2025-49176"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wyuw-13t9-rbg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267378?format=json","vulnerability_id":"VCID-wzer-jnm3-rqa8","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33999.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-33999","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01819","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01776","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-33999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451106","reference_id":"2451106","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451106"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2026-33999","reference_id":"CVE-2026-33999","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2026-33999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10739","reference_id":"RHSA-2026:10739","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:10739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11352","reference_id":"RHSA-2026:11352","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11369","reference_id":"RHSA-2026:11369","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11388","reference_id":"RHSA-2026:11388","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11656","reference_id":"RHSA-2026:11656","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11692","reference_id":"RHSA-2026:11692","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-33999"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wzer-jnm3-rqa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267380?format=json","vulnerability_id":"VCID-x3dk-fny6-fqa5","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34001.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-34001","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03012","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-34001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34001"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451109","reference_id":"2451109","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2451109"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2026-34001","reference_id":"CVE-2026-34001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2026-34001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10739","reference_id":"RHSA-2026:10739","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:10739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11352","reference_id":"RHSA-2026:11352","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11369","reference_id":"RHSA-2026:11369","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11388","reference_id":"RHSA-2026:11388","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11656","reference_id":"RHSA-2026:11656","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11692","reference_id":"RHSA-2026:11692","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:11692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2026-34001"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x3dk-fny6-fqa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49326?format=json","vulnerability_id":"VCID-x3p6-a59z-ebf3","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6478","reference_id":"","reference_type":"","scores":[{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78506","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78941","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78972","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78996","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78999","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78958","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253298","reference_id":"2253298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253298"},{"reference_url":"https://security.gentoo.org/glsa/202401-30","reference_id":"GLSA-202401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7886","reference_id":"RHSA-2023:7886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0006","reference_id":"RHSA-2024:0006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0009","reference_id":"RHSA-2024:0009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0010","reference_id":"RHSA-2024:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0014","reference_id":"RHSA-2024:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0015","reference_id":"RHSA-2024:0015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0016","reference_id":"RHSA-2024:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0017","reference_id":"RHSA-2024:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0018","reference_id":"RHSA-2024:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0020","reference_id":"RHSA-2024:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2169","reference_id":"RHSA-2024:2169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2170","reference_id":"RHSA-2024:2170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2995","reference_id":"RHSA-2024:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2996","reference_id":"RHSA-2024:2996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12751","reference_id":"RHSA-2025:12751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"reference_url":"https://usn.ubuntu.com/6555-1/","reference_id":"USN-6555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-1/"},{"reference_url":"https://usn.ubuntu.com/6555-2/","reference_id":"USN-6555-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6555-2/"},{"reference_url":"https://usn.ubuntu.com/6587-5/","reference_id":"USN-6587-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6587-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943585?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943584?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943583?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2023-6478"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x3p6-a59z-ebf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63880?format=json","vulnerability_id":"VCID-xk4b-12p1-ckam","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12186","reference_id":"","reference_type":"","scores":[{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.7332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.7328","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73273","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509216","reference_id":"1509216","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509216"},{"reference_url":"https://usn.ubuntu.com/3456-1/","reference_id":"USN-3456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943558?format=json","purl":"pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12186"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xk4b-12p1-ckam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47296?format=json","vulnerability_id":"VCID-y69n-tgmv-nubg","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2361.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2361.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2361","reference_id":"","reference_type":"","scores":[{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80973","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80972","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.8107","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020244","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020244"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29665","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29665"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=448784","reference_id":"448784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=448784"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2361","reference_id":"CVE-2008-2361","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2361"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943543?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2008-2361"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y69n-tgmv-nubg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48127?format=json","vulnerability_id":"VCID-y9c9-2teb-ryfb","summary":"Multiple vulnerabilities in the X.Org X server might allow local\n    attackers to disclose information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4028.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4028","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27892","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.277","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2771","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27486","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27413","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=745755","reference_id":"745755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=745755"},{"reference_url":"https://security.gentoo.org/glsa/201110-19","reference_id":"GLSA-201110-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0303","reference_id":"RHSA-2012:0303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0939","reference_id":"RHSA-2012:0939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0939"},{"reference_url":"https://usn.ubuntu.com/1232-1/","reference_id":"USN-1232-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1232-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943548?format=json","purl":"pkg:deb/debian/xorg-server@2:1.11.1.901-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.11.1.901-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2011-4028"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y9c9-2teb-ryfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41629?format=json","vulnerability_id":"VCID-zbbj-umsp-nyfy","summary":"Multiple vulnerabilities have been discovered in the X.Org X server and\n    Xfont library, allowing for a local privilege escalation and arbitrary code\n    execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6427.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6427","reference_id":"","reference_type":"","scores":[{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88732","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.8876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88802","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88798","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.8882","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0424","scoring_system":"epss","scoring_elements":"0.88819","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=413811","reference_id":"413811","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=413811"},{"reference_url":"https://security.gentoo.org/glsa/200801-09","reference_id":"GLSA-200801-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0029","reference_id":"RHSA-2008:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0030","reference_id":"RHSA-2008:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0031","reference_id":"RHSA-2008:0031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0031"},{"reference_url":"https://usn.ubuntu.com/571-1/","reference_id":"USN-571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943542?format=json","purl":"pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2007-6427"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbbj-umsp-nyfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46287?format=json","vulnerability_id":"VCID-zhdy-8stm-q3ey","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4009","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25604","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25799","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25757","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25684","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026072","reference_id":"2026072","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026072"},{"reference_url":"https://security.archlinux.org/AVG-2636","reference_id":"AVG-2636","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2636"},{"reference_url":"https://security.archlinux.org/AVG-2640","reference_id":"AVG-2640","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2640"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0003","reference_id":"RHSA-2022:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1917","reference_id":"RHSA-2022:1917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1917"},{"reference_url":"https://usn.ubuntu.com/5193-1/","reference_id":"USN-5193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-1/"},{"reference_url":"https://usn.ubuntu.com/5193-2/","reference_id":"USN-5193-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-2/"},{"reference_url":"https://usn.ubuntu.com/5193-3/","reference_id":"USN-5193-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5193-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943566?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943565?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}],"aliases":["CVE-2021-4009"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhdy-8stm-q3ey"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"}