{"url":"http://public2.vulnerablecode.io/api/packages/77031?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6","type":"ebuild","namespace":"x11-base","name":"xorg-server","version":"1.3.0.0-r6","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.10.4-r1","latest_non_vulnerable_version":"21.1.16","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47294?format=json","vulnerability_id":"VCID-9y4q-2tnh-jkcs","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1379.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1379.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1379","reference_id":"","reference_type":"","scores":[{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76966","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76985","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77018","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.77022","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30628"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/32545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32545"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020246","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020246"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43016","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29669","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29669"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445414","reference_id":"445414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445414"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1379","reference_id":"CVE-2008-1379","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1379"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0512","reference_id":"RHSA-2008:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0512"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77031?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6"}],"aliases":["CVE-2008-1379"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9y4q-2tnh-jkcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47293?format=json","vulnerability_id":"VCID-g15b-mt4a-kbhc","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1377.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1377","reference_id":"","reference_type":"","scores":[{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85055","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.8492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84947","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.8497","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84985","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84987","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85016","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85031","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30628"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/32545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32545"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020247","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020247"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445403","reference_id":"445403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445403"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1377","reference_id":"CVE-2008-1377","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1377"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0512","reference_id":"RHSA-2008:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0512"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77031?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6"}],"aliases":["CVE-2008-1377"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g15b-mt4a-kbhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47297?format=json","vulnerability_id":"VCID-q8sq-vkr5-2ba5","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2362.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2362","reference_id":"","reference_type":"","scores":[{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.84077","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83935","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.8398","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83974","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.8397","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.83997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.84023","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.8403","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.84034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02076","scoring_system":"epss","scoring_elements":"0.84054","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020245","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020245"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29670","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29670"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=448785","reference_id":"448785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=448785"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2362","reference_id":"CVE-2008-2362","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2362"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77031?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6"}],"aliases":["CVE-2008-2362"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8sq-vkr5-2ba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47295?format=json","vulnerability_id":"VCID-vtxx-3wd9-x7hz","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0512.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2360.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2360","reference_id":"","reference_type":"","scores":[{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83279","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.8341","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0192","scoring_system":"epss","scoring_elements":"0.83444","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30628"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020243","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020243"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=448783","reference_id":"448783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=448783"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2360","reference_id":"CVE-2008-2360","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2360"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0512","reference_id":"RHSA-2008:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0512"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77031?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6"}],"aliases":["CVE-2008-2360"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vtxx-3wd9-x7hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47296?format=json","vulnerability_id":"VCID-y69n-tgmv-nubg","summary":"Multiple vulnerabilities have been discovered in the X.Org X server,\n    possibly allowing for the remote execution of arbitrary code with root\n    privileges.","references":[{"reference_url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0502.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0504.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2361.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2361.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2361","reference_id":"","reference_type":"","scores":[{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81114","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80973","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80972","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.80999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.8107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81093","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361"},{"reference_url":"http://secunia.com/advisories/30627","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30627"},{"reference_url":"http://secunia.com/advisories/30629","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30629"},{"reference_url":"http://secunia.com/advisories/30630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30630"},{"reference_url":"http://secunia.com/advisories/30637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30637"},{"reference_url":"http://secunia.com/advisories/30659","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30659"},{"reference_url":"http://secunia.com/advisories/30664","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30664"},{"reference_url":"http://secunia.com/advisories/30666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30666"},{"reference_url":"http://secunia.com/advisories/30671","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30671"},{"reference_url":"http://secunia.com/advisories/30715","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30715"},{"reference_url":"http://secunia.com/advisories/30772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30772"},{"reference_url":"http://secunia.com/advisories/30809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30809"},{"reference_url":"http://secunia.com/advisories/30843","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30843"},{"reference_url":"http://secunia.com/advisories/31025","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31025"},{"reference_url":"http://secunia.com/advisories/31109","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31109"},{"reference_url":"http://secunia.com/advisories/32099","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32099"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-07.xml"},{"reference_url":"http://securitytracker.com/id?1020244","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020244"},{"reference_url":"https://issues.rpath.com/browse/RPL-2607","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2607"},{"reference_url":"https://issues.rpath.com/browse/RPL-2619","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2619"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"},{"reference_url":"http://www.debian.org/security/2008/dsa-1595","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1595"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0503.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493548/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493550/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29665","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29665"},{"reference_url":"http://www.ubuntu.com/usn/usn-616-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-616-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1803","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1803"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1833"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1983/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1983/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=448784","reference_id":"448784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=448784"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2361","reference_id":"CVE-2008-2361","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2361"},{"reference_url":"https://security.gentoo.org/glsa/200806-07","reference_id":"GLSA-200806-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0502","reference_id":"RHSA-2008:0502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0503","reference_id":"RHSA-2008:0503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0504","reference_id":"RHSA-2008:0504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0504"},{"reference_url":"https://usn.ubuntu.com/616-1/","reference_id":"USN-616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/616-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77031?format=json","purl":"pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6"}],"aliases":["CVE-2008-2361"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y69n-tgmv-nubg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.3.0.0-r6"}