Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/x11-base/xwayland@23.1.1
Typeebuild
Namespacex11-base
Namexwayland
Version23.1.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version23.2.4
Latest_non_vulnerable_version24.1.6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1cjg-y5qm-sffh
vulnerability_id VCID-1cjg-y5qm-sffh
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4008
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22403
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.2225
published_at 2026-04-29T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22421
published_at 2026-04-21T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22269
published_at 2026-04-24T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22255
published_at 2026-04-26T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.2257
published_at 2026-04-02T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-04T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.224
published_at 2026-04-07T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22481
published_at 2026-04-08T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22536
published_at 2026-04-09T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22555
published_at 2026-04-11T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22514
published_at 2026-04-12T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-13T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-16T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22471
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026059
reference_id 2026059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026059
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2021-4008
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjg-y5qm-sffh
1
url VCID-28er-gwh3-rugq
vulnerability_id VCID-28er-gwh3-rugq
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.33954
published_at 2026-04-13T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33978
published_at 2026-04-12T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.3402
published_at 2026-04-11T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34021
published_at 2026-04-09T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.33989
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33947
published_at 2026-04-07T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.3409
published_at 2026-04-04T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-02T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.34833
published_at 2026-04-29T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35239
published_at 2026-04-16T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.35225
published_at 2026-04-18T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-21T12:55:00Z
12
value 0.00148
scoring_system epss
scoring_elements 0.34942
published_at 2026-04-24T12:55:00Z
13
value 0.00148
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
reference_id 2151757
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46342
reference_id CVE-2022-46342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://access.redhat.com/security/cve/CVE-2022-46342
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-46342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq
2
url VCID-44yr-b94s-nfd5
vulnerability_id VCID-44yr-b94s-nfd5
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
reference_id
reference_type
scores
0
value 0.0113
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-02T12:55:00Z
1
value 0.0113
scoring_system epss
scoring_elements 0.78293
published_at 2026-04-04T12:55:00Z
2
value 0.0113
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-07T12:55:00Z
3
value 0.0113
scoring_system epss
scoring_elements 0.78301
published_at 2026-04-08T12:55:00Z
4
value 0.0113
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-09T12:55:00Z
5
value 0.0113
scoring_system epss
scoring_elements 0.78333
published_at 2026-04-11T12:55:00Z
6
value 0.0113
scoring_system epss
scoring_elements 0.78316
published_at 2026-04-12T12:55:00Z
7
value 0.0113
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-13T12:55:00Z
8
value 0.01202
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-29T12:55:00Z
9
value 0.01202
scoring_system epss
scoring_elements 0.78955
published_at 2026-04-16T12:55:00Z
10
value 0.01202
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-18T12:55:00Z
11
value 0.01202
scoring_system epss
scoring_elements 0.78951
published_at 2026-04-21T12:55:00Z
12
value 0.01202
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-24T12:55:00Z
13
value 0.01202
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
reference_id 2151755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-46340
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5
3
url VCID-6qsh-kaxk-zuf9
vulnerability_id VCID-6qsh-kaxk-zuf9
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4011
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12368
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12243
published_at 2026-04-29T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-21T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12387
published_at 2026-04-24T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12354
published_at 2026-04-26T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12476
published_at 2026-04-02T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-04T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12324
published_at 2026-04-07T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12404
published_at 2026-04-08T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12455
published_at 2026-04-09T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.1246
published_at 2026-04-11T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12422
published_at 2026-04-12T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12381
published_at 2026-04-13T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12282
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026074
reference_id 2026074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026074
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2021-4011
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qsh-kaxk-zuf9
4
url VCID-a4bk-m98g-93f8
vulnerability_id VCID-a4bk-m98g-93f8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
reference_id
reference_type
scores
0
value 0.00908
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-02T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75742
published_at 2026-04-04T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-07T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-13T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75772
published_at 2026-04-12T12:55:00Z
7
value 0.00966
scoring_system epss
scoring_elements 0.76661
published_at 2026-04-29T12:55:00Z
8
value 0.00966
scoring_system epss
scoring_elements 0.76618
published_at 2026-04-16T12:55:00Z
9
value 0.00966
scoring_system epss
scoring_elements 0.76622
published_at 2026-04-18T12:55:00Z
10
value 0.00966
scoring_system epss
scoring_elements 0.7661
published_at 2026-04-21T12:55:00Z
11
value 0.00966
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-24T12:55:00Z
12
value 0.00966
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
reference_id 2151760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-46344
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8
5
url VCID-bvay-s9w4-muf8
vulnerability_id VCID-bvay-s9w4-muf8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3551
reference_id
reference_type
scores
0
value 0.00749
scoring_system epss
scoring_elements 0.73079
published_at 2026-04-02T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.73099
published_at 2026-04-04T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73073
published_at 2026-04-07T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.73109
published_at 2026-04-08T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73123
published_at 2026-04-09T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73148
published_at 2026-04-11T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73127
published_at 2026-04-12T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73121
published_at 2026-04-13T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73164
published_at 2026-04-16T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.73174
published_at 2026-04-18T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73165
published_at 2026-04-21T12:55:00Z
11
value 0.00749
scoring_system epss
scoring_elements 0.73201
published_at 2026-04-24T12:55:00Z
12
value 0.00749
scoring_system epss
scoring_elements 0.73214
published_at 2026-04-26T12:55:00Z
13
value 0.00749
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140701
reference_id 2140701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140701
6
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
7
reference_url https://access.redhat.com/errata/RHSA-2022:8491
reference_id RHSA-2022:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8491
8
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
9
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
10
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
11
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
12
reference_url https://usn.ubuntu.com/5740-1/
reference_id USN-5740-1
reference_type
scores
url https://usn.ubuntu.com/5740-1/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-3551
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bvay-s9w4-muf8
6
url VCID-cxf3-8znp-rbbz
vulnerability_id VCID-cxf3-8znp-rbbz
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3553
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30833
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30305
published_at 2026-04-29T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.307
published_at 2026-04-13T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30725
published_at 2026-04-16T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30705
published_at 2026-04-18T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30671
published_at 2026-04-21T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30499
published_at 2026-04-24T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30387
published_at 2026-04-26T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30879
published_at 2026-04-04T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-07T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30756
published_at 2026-04-08T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30788
published_at 2026-04-09T12:55:00Z
12
value 0.00118
scoring_system epss
scoring_elements 0.30791
published_at 2026-04-11T12:55:00Z
13
value 0.00118
scoring_system epss
scoring_elements 0.30747
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140706
reference_id 2140706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140706
4
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/
url https://security.gentoo.org/glsa/202305-30
5
reference_url https://vuldb.com/?id.211053
reference_id ?id.211053
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/
url https://vuldb.com/?id.211053
6
reference_url https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3
reference_id ?id=dfd057996b26420309c324ec844a5ba6dd07eda3
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/
url https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-3553
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxf3-8znp-rbbz
7
url VCID-e7w3-3hpm-hbec
vulnerability_id VCID-e7w3-3hpm-hbec
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-12T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39146
published_at 2026-04-11T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39135
published_at 2026-04-09T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-08T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-04T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39063
published_at 2026-04-07T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39121
published_at 2026-04-02T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-13T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40281
published_at 2026-04-29T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-18T12:55:00Z
11
value 0.00187
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-21T12:55:00Z
12
value 0.00187
scoring_system epss
scoring_elements 0.40375
published_at 2026-04-24T12:55:00Z
13
value 0.00187
scoring_system epss
scoring_elements 0.40362
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
reference_id 2151761
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-4283
reference_id CVE-2022-4283
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://access.redhat.com/security/cve/CVE-2022-4283
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-4283
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec
8
url VCID-fcac-qzvs-rfa8
vulnerability_id VCID-fcac-qzvs-rfa8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4010
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23318
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23145
published_at 2026-04-29T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23355
published_at 2026-04-21T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23164
published_at 2026-04-24T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23154
published_at 2026-04-26T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23492
published_at 2026-04-02T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23528
published_at 2026-04-04T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23312
published_at 2026-04-07T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23384
published_at 2026-04-08T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23435
published_at 2026-04-09T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23455
published_at 2026-04-11T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23417
published_at 2026-04-12T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-13T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.2338
published_at 2026-04-16T12:55:00Z
14
value 0.00079
scoring_system epss
scoring_elements 0.23375
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026073
reference_id 2026073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026073
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2021-4010
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fcac-qzvs-rfa8
9
url VCID-jrx7-pbf3-h3at
vulnerability_id VCID-jrx7-pbf3-h3at
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
9
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
reference_id 2151756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46341
reference_id CVE-2022-46341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://access.redhat.com/security/cve/CVE-2022-46341
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-46341
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at
10
url VCID-m2hp-k4c4-m3db
vulnerability_id VCID-m2hp-k4c4-m3db
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3550
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61403
published_at 2026-04-02T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-04T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-07T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61448
published_at 2026-04-08T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61464
published_at 2026-04-09T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61485
published_at 2026-04-11T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61471
published_at 2026-04-12T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61453
published_at 2026-04-13T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-16T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61496
published_at 2026-04-18T12:55:00Z
10
value 0.00412
scoring_system epss
scoring_elements 0.6148
published_at 2026-04-21T12:55:00Z
11
value 0.00412
scoring_system epss
scoring_elements 0.61467
published_at 2026-04-24T12:55:00Z
12
value 0.00412
scoring_system epss
scoring_elements 0.61484
published_at 2026-04-26T12:55:00Z
13
value 0.00412
scoring_system epss
scoring_elements 0.61479
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140698
reference_id 2140698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140698
6
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
7
reference_url https://access.redhat.com/errata/RHSA-2022:8491
reference_id RHSA-2022:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8491
8
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
9
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
10
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
11
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
12
reference_url https://usn.ubuntu.com/5740-1/
reference_id USN-5740-1
reference_type
scores
url https://usn.ubuntu.com/5740-1/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-3550
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2hp-k4c4-m3db
11
url VCID-uxsy-k3cg-mkdd
vulnerability_id VCID-uxsy-k3cg-mkdd
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
9
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
reference_id 2151758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46343
reference_id CVE-2022-46343
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://access.redhat.com/security/cve/CVE-2022-46343
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2022-46343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd
12
url VCID-wh9v-35ju-vbcb
vulnerability_id VCID-wh9v-35ju-vbcb
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-02T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69768
published_at 2026-04-07T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69792
published_at 2026-04-04T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69816
published_at 2026-04-08T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69831
published_at 2026-04-09T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69854
published_at 2026-04-11T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69839
published_at 2026-04-12T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69824
published_at 2026-04-13T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72341
published_at 2026-04-29T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72292
published_at 2026-04-21T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72336
published_at 2026-04-24T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.72345
published_at 2026-04-26T12:55:00Z
12
value 0.00711
scoring_system epss
scoring_elements 0.72295
published_at 2026-04-16T12:55:00Z
13
value 0.00711
scoring_system epss
scoring_elements 0.72304
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
reference_id 003320.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
5
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
reference_id 0ba6d8c37071131a49790243cdac55392ecf71ec
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
reference_id 1030777
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
reference_id 2165995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://access.redhat.com/errata/RHSA-2023:0622
reference_id RHSA-2023:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0622
10
reference_url https://access.redhat.com/errata/RHSA-2023:0623
reference_id RHSA-2023:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0623
11
reference_url https://access.redhat.com/errata/RHSA-2023:0662
reference_id RHSA-2023:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0662
12
reference_url https://access.redhat.com/errata/RHSA-2023:0663
reference_id RHSA-2023:0663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0663
13
reference_url https://access.redhat.com/errata/RHSA-2023:0664
reference_id RHSA-2023:0664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0664
14
reference_url https://access.redhat.com/errata/RHSA-2023:0665
reference_id RHSA-2023:0665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0665
15
reference_url https://access.redhat.com/errata/RHSA-2023:0671
reference_id RHSA-2023:0671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0671
16
reference_url https://access.redhat.com/errata/RHSA-2023:0675
reference_id RHSA-2023:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0675
17
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
18
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
19
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
20
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
23
reference_url https://usn.ubuntu.com/5846-1/
reference_id USN-5846-1
reference_type
scores
url https://usn.ubuntu.com/5846-1/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2023-0494
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh9v-35ju-vbcb
13
url VCID-wp8b-r6p1-7kcf
vulnerability_id VCID-wp8b-r6p1-7kcf
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23801
published_at 2026-04-02T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23662
published_at 2026-04-16T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2365
published_at 2026-04-13T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23706
published_at 2026-04-12T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-11T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23734
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-08T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-04T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23618
published_at 2026-04-07T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.2586
published_at 2026-04-29T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26007
published_at 2026-04-18T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25972
published_at 2026-04-21T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25912
published_at 2026-04-24T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25908
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2023/03/29/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://www.openwall.com/lists/oss-security/2023/03/29/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
reference_id 2180288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
reference_id 26ef545b3502f61ca722a7a3373507e88ef64110
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
reference_id BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
reference_id H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
reference_id MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
reference_id NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
reference_id PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
reference_id QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
14
reference_url https://access.redhat.com/errata/RHSA-2023:1548
reference_id RHSA-2023:1548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1548
15
reference_url https://access.redhat.com/errata/RHSA-2023:1549
reference_id RHSA-2023:1549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1549
16
reference_url https://access.redhat.com/errata/RHSA-2023:1551
reference_id RHSA-2023:1551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1551
17
reference_url https://access.redhat.com/errata/RHSA-2023:1592
reference_id RHSA-2023:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1592
18
reference_url https://access.redhat.com/errata/RHSA-2023:1594
reference_id RHSA-2023:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1594
19
reference_url https://access.redhat.com/errata/RHSA-2023:1598
reference_id RHSA-2023:1598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1598
20
reference_url https://access.redhat.com/errata/RHSA-2023:1599
reference_id RHSA-2023:1599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1599
21
reference_url https://access.redhat.com/errata/RHSA-2023:1600
reference_id RHSA-2023:1600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1600
22
reference_url https://access.redhat.com/errata/RHSA-2023:6340
reference_id RHSA-2023:6340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6340
23
reference_url https://access.redhat.com/errata/RHSA-2023:6341
reference_id RHSA-2023:6341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6341
24
reference_url https://access.redhat.com/errata/RHSA-2023:6916
reference_id RHSA-2023:6916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6916
25
reference_url https://access.redhat.com/errata/RHSA-2023:6917
reference_id RHSA-2023:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6917
26
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
reference_id SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
reference_id SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
29
reference_url https://usn.ubuntu.com/5986-1/
reference_id USN-5986-1
reference_type
scores
url https://usn.ubuntu.com/5986-1/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2023-1393
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wp8b-r6p1-7kcf
14
url VCID-zhdy-8stm-q3ey
vulnerability_id VCID-zhdy-8stm-q3ey
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4009
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25795
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25546
published_at 2026-04-29T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25661
published_at 2026-04-21T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-24T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25596
published_at 2026-04-26T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25855
published_at 2026-04-02T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25898
published_at 2026-04-04T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.2567
published_at 2026-04-07T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25741
published_at 2026-04-08T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25789
published_at 2026-04-09T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25799
published_at 2026-04-11T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25757
published_at 2026-04-12T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25699
published_at 2026-04-13T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25702
published_at 2026-04-16T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25684
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4009
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026072
reference_id 2026072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026072
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:ebuild/x11-base/xwayland@21.1.8
purl pkg:ebuild/x11-base/xwayland@21.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8
1
url pkg:ebuild/x11-base/xwayland@23.1.1
purl pkg:ebuild/x11-base/xwayland@23.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1
aliases CVE-2021-4009
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhdy-8stm-q3ey
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1