{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","type":"ebuild","namespace":"x11-base","name":"xorg-server","version":"1.20.10","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.20.11","latest_non_vulnerable_version":"21.1.16","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32174?format=json","vulnerability_id":"VCID-1742-kcnn-pyg5","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46152","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46084","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.45986","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46049","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46067","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46007","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46035","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46108","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142","reference_id":"1869142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869142"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}],"aliases":["CVE-2020-14361"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1742-kcnn-pyg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32170?format=json","vulnerability_id":"VCID-49m7-vqbk-s3ce","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29015","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29075","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2909","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29034","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29114","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241","reference_id":"1862241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862241"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"},{"reference_url":"https://usn.ubuntu.com/4490-1/","reference_id":"USN-4490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4490-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}],"aliases":["CVE-2020-14345"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49m7-vqbk-s3ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32176?format=json","vulnerability_id":"VCID-hhnr-av5b-t7dc","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39028","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38901","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38973","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3899","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.389","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38922","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38996","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144","reference_id":"1869144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869144"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}],"aliases":["CVE-2020-14362"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhnr-av5b-t7dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32172?format=json","vulnerability_id":"VCID-n95v-qmcg-6bek","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1835","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18232","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1826","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18216","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18078","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18166","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18267","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258","reference_id":"1862258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862258"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986","reference_id":"968986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986"},{"reference_url":"https://security.archlinux.org/AVG-1211","reference_id":"AVG-1211","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1211"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}],"aliases":["CVE-2020-14347"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n95v-qmcg-6bek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32171?format=json","vulnerability_id":"VCID-pcn1-ehd2-g3f7","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38073","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37634","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37651","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37565","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37538","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37616","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246","reference_id":"1862246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1862246"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4910","reference_id":"RHSA-2020:4910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4953","reference_id":"RHSA-2020:4953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4488-1/","reference_id":"USN-4488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-1/"},{"reference_url":"https://usn.ubuntu.com/4488-2/","reference_id":"USN-4488-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4488-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}],"aliases":["CVE-2020-14346"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcn1-ehd2-g3f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32173?format=json","vulnerability_id":"VCID-psr2-gkpa-z7fj","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27967","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27872","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27893","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28417","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28343","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27867","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27931","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27957","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139","reference_id":"1869139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1869139"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}],"aliases":["CVE-2020-14360"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psr2-gkpa-z7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32177?format=json","vulnerability_id":"VCID-wq4p-h17p-fyf4","summary":"Multiple vulnerabilities have been found in X.org X Server, the\n    worst of which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32804","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.327","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32725","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33035","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32684","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32752","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32791","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276","reference_id":"1887276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1887276"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216","reference_id":"976216","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216"},{"reference_url":"https://security.archlinux.org/ASA-202012-6","reference_id":"ASA-202012-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-6"},{"reference_url":"https://security.archlinux.org/AVG-1310","reference_id":"AVG-1310","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1310"},{"reference_url":"https://security.gentoo.org/glsa/202012-01","reference_id":"GLSA-202012-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5408","reference_id":"RHSA-2020:5408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1804","reference_id":"RHSA-2021:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1804"},{"reference_url":"https://usn.ubuntu.com/4656-1/","reference_id":"USN-4656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-1/"},{"reference_url":"https://usn.ubuntu.com/4656-2/","reference_id":"USN-4656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72098?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.20.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}],"aliases":["CVE-2020-25712"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wq4p-h17p-fyf4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.20.10"}