{"url":"http://public2.vulnerablecode.io/api/packages/84531?format=json","purl":"pkg:ebuild/x11-misc/x11vnc@0.8.1","type":"ebuild","namespace":"x11-misc","name":"x11vnc","version":"0.8.1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34782?format=json","vulnerability_id":"VCID-6cgs-ggbr-rqdg","summary":"VNC servers created with LibVNCServer accept insecure protocol types, even\n    when the server does not offer it, resulting in unauthorized access to the\n    server.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2450.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2450.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2450","reference_id":"","reference_type":"","scores":[{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.8703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87064","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87059","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87053","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.8707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87074","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87089","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87095","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03222","scoring_system":"epss","scoring_elements":"0.87116","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824","reference_id":"376824","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824"},{"reference_url":"https://security.gentoo.org/glsa/200608-05","reference_id":"GLSA-200608-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-05"},{"reference_url":"https://security.gentoo.org/glsa/200608-12","reference_id":"GLSA-200608-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-12"},{"reference_url":"https://security.gentoo.org/glsa/200703-19","reference_id":"GLSA-200703-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-19"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84531?format=json","purl":"pkg:ebuild/x11-misc/x11vnc@0.8.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-misc/x11vnc@0.8.1"}],"aliases":["CVE-2006-2450"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6cgs-ggbr-rqdg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-misc/x11vnc@0.8.1"}