Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/tigervnc@1.1.0-25.el6_10?arch=13
Typerpm
Namespaceredhat
Nametigervnc
Version1.1.0-25.el6_10
Qualifiers
arch 13
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-28er-gwh3-rugq
vulnerability_id VCID-28er-gwh3-rugq
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.33464
published_at 2026-05-07T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-02T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.3409
published_at 2026-04-04T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.33947
published_at 2026-04-07T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.33989
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34021
published_at 2026-04-09T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.3402
published_at 2026-04-11T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.33978
published_at 2026-04-12T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.33954
published_at 2026-04-13T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33395
published_at 2026-05-05T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.34833
published_at 2026-04-29T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35225
published_at 2026-04-18T12:55:00Z
12
value 0.00148
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-21T12:55:00Z
13
value 0.00148
scoring_system epss
scoring_elements 0.34942
published_at 2026-04-24T12:55:00Z
14
value 0.00148
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-26T12:55:00Z
15
value 0.00148
scoring_system epss
scoring_elements 0.35239
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
reference_id 2151757
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46342
reference_id CVE-2022-46342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://access.redhat.com/security/cve/CVE-2022-46342
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
aliases CVE-2022-46342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq
1
url VCID-44yr-b94s-nfd5
vulnerability_id VCID-44yr-b94s-nfd5
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
reference_id
reference_type
scores
0
value 0.0113
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-02T12:55:00Z
1
value 0.0113
scoring_system epss
scoring_elements 0.78293
published_at 2026-04-04T12:55:00Z
2
value 0.0113
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-07T12:55:00Z
3
value 0.0113
scoring_system epss
scoring_elements 0.78301
published_at 2026-04-08T12:55:00Z
4
value 0.0113
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-09T12:55:00Z
5
value 0.0113
scoring_system epss
scoring_elements 0.78333
published_at 2026-04-11T12:55:00Z
6
value 0.0113
scoring_system epss
scoring_elements 0.78316
published_at 2026-04-12T12:55:00Z
7
value 0.0113
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-13T12:55:00Z
8
value 0.01132
scoring_system epss
scoring_elements 0.78458
published_at 2026-05-07T12:55:00Z
9
value 0.01132
scoring_system epss
scoring_elements 0.78433
published_at 2026-05-05T12:55:00Z
10
value 0.01202
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-18T12:55:00Z
11
value 0.01202
scoring_system epss
scoring_elements 0.78951
published_at 2026-04-21T12:55:00Z
12
value 0.01202
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-26T12:55:00Z
13
value 0.01202
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-29T12:55:00Z
14
value 0.01202
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-24T12:55:00Z
15
value 0.01202
scoring_system epss
scoring_elements 0.78955
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
reference_id 2151755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
aliases CVE-2022-46340
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5
2
url VCID-4ngr-6ccu-r7fv
vulnerability_id VCID-4ngr-6ccu-r7fv
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26024
published_at 2026-05-07T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-24T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.2612
published_at 2026-04-26T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-29T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.2596
published_at 2026-05-05T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.28089
published_at 2026-04-04T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27951
published_at 2026-04-08T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27992
published_at 2026-04-09T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27995
published_at 2026-04-11T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27952
published_at 2026-04-12T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27893
published_at 2026-04-13T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27902
published_at 2026-04-16T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27841
published_at 2026-04-21T12:55:00Z
13
value 0.00101
scoring_system epss
scoring_elements 0.28048
published_at 2026-04-02T12:55:00Z
14
value 0.00101
scoring_system epss
scoring_elements 0.27884
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
reference_id 2272000
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31083
reference_id CVE-2024-31083
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/security/cve/CVE-2024-31083
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
aliases CVE-2024-31083
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ngr-6ccu-r7fv
3
url VCID-6rcq-qxef-nuf7
vulnerability_id VCID-6rcq-qxef-nuf7
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52779
published_at 2026-05-07T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52842
published_at 2026-04-21T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5281
published_at 2026-04-24T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52821
published_at 2026-04-26T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52783
published_at 2026-04-29T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52728
published_at 2026-05-05T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
11
value 0.00321
scoring_system epss
scoring_elements 0.55161
published_at 2026-04-18T12:55:00Z
12
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
13
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
14
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
reference_id 2256690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-0229
reference_id CVE-2024-0229
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/security/cve/CVE-2024-0229
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
aliases CVE-2024-0229
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcq-qxef-nuf7
4
url VCID-9cjy-6fj5-r7ag
vulnerability_id VCID-9cjy-6fj5-r7ag
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.3097
published_at 2026-05-07T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.30901
published_at 2026-05-05T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
14
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
15
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
reference_id 2271998
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31081
reference_id CVE-2024-31081
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/security/cve/CVE-2024-31081
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
aliases CVE-2024-31081
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cjy-6fj5-r7ag
5
url VCID-a4bk-m98g-93f8
vulnerability_id VCID-a4bk-m98g-93f8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
reference_id
reference_type
scores
0
value 0.00908
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-02T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75742
published_at 2026-04-04T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-07T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-13T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75772
published_at 2026-04-12T12:55:00Z
7
value 0.0091
scoring_system epss
scoring_elements 0.75935
published_at 2026-05-07T12:55:00Z
8
value 0.0091
scoring_system epss
scoring_elements 0.75906
published_at 2026-05-05T12:55:00Z
9
value 0.00966
scoring_system epss
scoring_elements 0.76622
published_at 2026-04-18T12:55:00Z
10
value 0.00966
scoring_system epss
scoring_elements 0.7661
published_at 2026-04-21T12:55:00Z
11
value 0.00966
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-26T12:55:00Z
12
value 0.00966
scoring_system epss
scoring_elements 0.76661
published_at 2026-04-29T12:55:00Z
13
value 0.00966
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-24T12:55:00Z
14
value 0.00966
scoring_system epss
scoring_elements 0.76618
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
reference_id 2151760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
aliases CVE-2022-46344
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8
6
url VCID-e7w3-3hpm-hbec
vulnerability_id VCID-e7w3-3hpm-hbec
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38712
published_at 2026-05-07T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39121
published_at 2026-04-02T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-04T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39063
published_at 2026-04-07T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-08T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39135
published_at 2026-04-09T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39146
published_at 2026-04-11T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-12T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-13T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.38638
published_at 2026-05-05T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40362
published_at 2026-04-26T12:55:00Z
11
value 0.00187
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-21T12:55:00Z
12
value 0.00187
scoring_system epss
scoring_elements 0.40375
published_at 2026-04-24T12:55:00Z
13
value 0.00187
scoring_system epss
scoring_elements 0.40281
published_at 2026-04-29T12:55:00Z
14
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
15
value 0.00187
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
reference_id 2151761
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-4283
reference_id CVE-2022-4283
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://access.redhat.com/security/cve/CVE-2022-4283
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
aliases CVE-2022-4283
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec
7
url VCID-j6qd-r6ua-cfbm
vulnerability_id VCID-j6qd-r6ua-cfbm
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46906
published_at 2026-05-07T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46844
published_at 2026-05-05T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
13
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
14
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
reference_id 2256542
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21886
reference_id CVE-2024-21886
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/security/cve/CVE-2024-21886
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
aliases CVE-2024-21886
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6qd-r6ua-cfbm
8
url VCID-jrx7-pbf3-h3at
vulnerability_id VCID-jrx7-pbf3-h3at
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01112
scoring_system epss
scoring_elements 0.7828
published_at 2026-05-07T12:55:00Z
9
value 0.01112
scoring_system epss
scoring_elements 0.78254
published_at 2026-05-05T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
14
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
15
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
reference_id 2151756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46341
reference_id CVE-2022-46341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://access.redhat.com/security/cve/CVE-2022-46341
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
aliases CVE-2022-46341
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at
9
url VCID-juet-bb4m-hkhq
vulnerability_id VCID-juet-bb4m-hkhq
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17597
published_at 2026-05-07T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17692
published_at 2026-04-26T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17648
published_at 2026-04-29T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17505
published_at 2026-05-05T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17991
published_at 2026-04-02T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18045
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17745
published_at 2026-04-07T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17833
published_at 2026-04-08T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17895
published_at 2026-04-09T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.1791
published_at 2026-04-11T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17866
published_at 2026-04-12T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17817
published_at 2026-04-13T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-16T12:55:00Z
13
value 0.00057
scoring_system epss
scoring_elements 0.17769
published_at 2026-04-18T12:55:00Z
14
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-21T12:55:00Z
15
value 0.00057
scoring_system epss
scoring_elements 0.17716
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
reference_id 1086244
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
reference_id 1086245
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
reference_id 2317233
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2024-9632
reference_id CVE-2024-9632
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/security/cve/CVE-2024-9632
28
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
29
reference_url https://access.redhat.com/errata/RHSA-2024:10090
reference_id RHSA-2024:10090
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:10090
30
reference_url https://access.redhat.com/errata/RHSA-2024:8798
reference_id RHSA-2024:8798
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:8798
31
reference_url https://access.redhat.com/errata/RHSA-2024:9540
reference_id RHSA-2024:9540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9540
32
reference_url https://access.redhat.com/errata/RHSA-2024:9579
reference_id RHSA-2024:9579
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9579
33
reference_url https://access.redhat.com/errata/RHSA-2024:9601
reference_id RHSA-2024:9601
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9601
34
reference_url https://access.redhat.com/errata/RHSA-2024:9690
reference_id RHSA-2024:9690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9690
35
reference_url https://access.redhat.com/errata/RHSA-2024:9816
reference_id RHSA-2024:9816
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9816
36
reference_url https://access.redhat.com/errata/RHSA-2024:9818
reference_id RHSA-2024:9818
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9818
37
reference_url https://access.redhat.com/errata/RHSA-2024:9819
reference_id RHSA-2024:9819
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9819
38
reference_url https://access.redhat.com/errata/RHSA-2024:9820
reference_id RHSA-2024:9820
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9820
39
reference_url https://access.redhat.com/errata/RHSA-2024:9901
reference_id RHSA-2024:9901
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9901
40
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:12751
41
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7163
42
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7165
43
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7458
44
reference_url https://usn.ubuntu.com/7085-1/
reference_id USN-7085-1
reference_type
scores
url https://usn.ubuntu.com/7085-1/
45
reference_url https://usn.ubuntu.com/7085-2/
reference_id USN-7085-2
reference_type
scores
url https://usn.ubuntu.com/7085-2/
fixed_packages
aliases CVE-2024-9632
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juet-bb4m-hkhq
10
url VCID-p1tf-2c6u-tygr
vulnerability_id VCID-p1tf-2c6u-tygr
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.3097
published_at 2026-05-07T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.30901
published_at 2026-05-05T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
14
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
15
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
reference_id 2271997
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31080
reference_id CVE-2024-31080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/security/cve/CVE-2024-31080
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
aliases CVE-2024-31080
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1tf-2c6u-tygr
11
url VCID-phkz-t2yr-m7em
vulnerability_id VCID-phkz-t2yr-m7em
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
reference_id
reference_type
scores
0
value 0.03015
scoring_system epss
scoring_elements 0.86643
published_at 2026-04-26T12:55:00Z
1
value 0.03015
scoring_system epss
scoring_elements 0.86616
published_at 2026-04-21T12:55:00Z
2
value 0.03015
scoring_system epss
scoring_elements 0.86642
published_at 2026-04-29T12:55:00Z
3
value 0.03015
scoring_system epss
scoring_elements 0.86682
published_at 2026-05-07T12:55:00Z
4
value 0.03015
scoring_system epss
scoring_elements 0.86664
published_at 2026-05-05T12:55:00Z
5
value 0.03015
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-24T12:55:00Z
6
value 0.03264
scoring_system epss
scoring_elements 0.87115
published_at 2026-04-07T12:55:00Z
7
value 0.03264
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-04T12:55:00Z
8
value 0.03264
scoring_system epss
scoring_elements 0.87105
published_at 2026-04-02T12:55:00Z
9
value 0.03264
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-08T12:55:00Z
10
value 0.03264
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-09T12:55:00Z
11
value 0.03264
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-11T12:55:00Z
12
value 0.03264
scoring_system epss
scoring_elements 0.87151
published_at 2026-04-12T12:55:00Z
13
value 0.03264
scoring_system epss
scoring_elements 0.87146
published_at 2026-04-13T12:55:00Z
14
value 0.03264
scoring_system epss
scoring_elements 0.87163
published_at 2026-04-16T12:55:00Z
15
value 0.03264
scoring_system epss
scoring_elements 0.87167
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
reference_id 2257691
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2023-6816
reference_id CVE-2023-6816
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/security/cve/CVE-2023-6816
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
aliases CVE-2023-6816
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-phkz-t2yr-m7em
12
url VCID-un9v-4svv-2baj
vulnerability_id VCID-un9v-4svv-2baj
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20089
published_at 2026-04-02T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20146
published_at 2026-04-04T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19876
published_at 2026-04-07T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-08T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-09T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-11T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19985
published_at 2026-04-12T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19927
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19905
published_at 2026-04-16T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19909
published_at 2026-04-18T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19906
published_at 2026-04-21T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19799
published_at 2026-04-24T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19794
published_at 2026-04-26T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-29T12:55:00Z
14
value 0.00064
scoring_system epss
scoring_elements 0.19674
published_at 2026-05-05T12:55:00Z
15
value 0.00064
scoring_system epss
scoring_elements 0.1975
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
reference_id 2243091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:6802
reference_id RHSA-2023:6802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6802
8
reference_url https://access.redhat.com/errata/RHSA-2023:6808
reference_id RHSA-2023:6808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6808
9
reference_url https://access.redhat.com/errata/RHSA-2023:7373
reference_id RHSA-2023:7373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7373
10
reference_url https://access.redhat.com/errata/RHSA-2023:7388
reference_id RHSA-2023:7388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7388
11
reference_url https://access.redhat.com/errata/RHSA-2023:7405
reference_id RHSA-2023:7405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7405
12
reference_url https://access.redhat.com/errata/RHSA-2023:7428
reference_id RHSA-2023:7428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7428
13
reference_url https://access.redhat.com/errata/RHSA-2023:7436
reference_id RHSA-2023:7436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7436
14
reference_url https://access.redhat.com/errata/RHSA-2023:7526
reference_id RHSA-2023:7526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7526
15
reference_url https://access.redhat.com/errata/RHSA-2023:7533
reference_id RHSA-2023:7533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7533
16
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
17
reference_url https://access.redhat.com/errata/RHSA-2024:0128
reference_id RHSA-2024:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0128
18
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
19
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
20
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
21
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
22
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
23
reference_url https://usn.ubuntu.com/6453-1/
reference_id USN-6453-1
reference_type
scores
url https://usn.ubuntu.com/6453-1/
24
reference_url https://usn.ubuntu.com/6453-2/
reference_id USN-6453-2
reference_type
scores
url https://usn.ubuntu.com/6453-2/
fixed_packages
aliases CVE-2023-5367
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un9v-4svv-2baj
13
url VCID-uxsy-k3cg-mkdd
vulnerability_id VCID-uxsy-k3cg-mkdd
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01112
scoring_system epss
scoring_elements 0.7828
published_at 2026-05-07T12:55:00Z
9
value 0.01112
scoring_system epss
scoring_elements 0.78254
published_at 2026-05-05T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
14
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
15
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
reference_id 2151758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46343
reference_id CVE-2022-46343
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://access.redhat.com/security/cve/CVE-2022-46343
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
aliases CVE-2022-46343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd
14
url VCID-v9p1-8sb6-9ufr
vulnerability_id VCID-v9p1-8sb6-9ufr
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46906
published_at 2026-05-07T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46844
published_at 2026-05-05T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
13
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
14
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
reference_id 2256540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21885
reference_id CVE-2024-21885
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/security/cve/CVE-2024-21885
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
aliases CVE-2024-21885
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9p1-8sb6-9ufr
15
url VCID-wh9v-35ju-vbcb
vulnerability_id VCID-wh9v-35ju-vbcb
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-02T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69816
published_at 2026-04-08T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69792
published_at 2026-04-04T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69768
published_at 2026-04-07T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69831
published_at 2026-04-09T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69854
published_at 2026-04-11T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69839
published_at 2026-04-12T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69824
published_at 2026-04-13T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72304
published_at 2026-04-18T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72332
published_at 2026-05-05T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72361
published_at 2026-05-07T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.72295
published_at 2026-04-16T12:55:00Z
12
value 0.00711
scoring_system epss
scoring_elements 0.72292
published_at 2026-04-21T12:55:00Z
13
value 0.00711
scoring_system epss
scoring_elements 0.72336
published_at 2026-04-24T12:55:00Z
14
value 0.00711
scoring_system epss
scoring_elements 0.72345
published_at 2026-04-26T12:55:00Z
15
value 0.00711
scoring_system epss
scoring_elements 0.72341
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
reference_id 003320.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
5
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
reference_id 0ba6d8c37071131a49790243cdac55392ecf71ec
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
reference_id 1030777
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
reference_id 2165995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://access.redhat.com/errata/RHSA-2023:0622
reference_id RHSA-2023:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0622
10
reference_url https://access.redhat.com/errata/RHSA-2023:0623
reference_id RHSA-2023:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0623
11
reference_url https://access.redhat.com/errata/RHSA-2023:0662
reference_id RHSA-2023:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0662
12
reference_url https://access.redhat.com/errata/RHSA-2023:0663
reference_id RHSA-2023:0663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0663
13
reference_url https://access.redhat.com/errata/RHSA-2023:0664
reference_id RHSA-2023:0664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0664
14
reference_url https://access.redhat.com/errata/RHSA-2023:0665
reference_id RHSA-2023:0665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0665
15
reference_url https://access.redhat.com/errata/RHSA-2023:0671
reference_id RHSA-2023:0671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0671
16
reference_url https://access.redhat.com/errata/RHSA-2023:0675
reference_id RHSA-2023:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0675
17
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
18
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
19
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
20
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
23
reference_url https://usn.ubuntu.com/5846-1/
reference_id USN-5846-1
reference_type
scores
url https://usn.ubuntu.com/5846-1/
fixed_packages
aliases CVE-2023-0494
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh9v-35ju-vbcb
16
url VCID-wp8b-r6p1-7kcf
vulnerability_id VCID-wp8b-r6p1-7kcf
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23801
published_at 2026-04-02T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23662
published_at 2026-04-16T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2365
published_at 2026-04-13T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23706
published_at 2026-04-12T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-11T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23734
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-08T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-04T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23618
published_at 2026-04-07T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.25811
published_at 2026-05-07T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26007
published_at 2026-04-18T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25972
published_at 2026-04-21T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25912
published_at 2026-04-24T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25908
published_at 2026-04-26T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.2586
published_at 2026-04-29T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.25753
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2023/03/29/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://www.openwall.com/lists/oss-security/2023/03/29/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
reference_id 2180288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
reference_id 26ef545b3502f61ca722a7a3373507e88ef64110
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
reference_id BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
reference_id H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
reference_id MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
reference_id NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
reference_id PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
reference_id QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
14
reference_url https://access.redhat.com/errata/RHSA-2023:1548
reference_id RHSA-2023:1548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1548
15
reference_url https://access.redhat.com/errata/RHSA-2023:1549
reference_id RHSA-2023:1549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1549
16
reference_url https://access.redhat.com/errata/RHSA-2023:1551
reference_id RHSA-2023:1551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1551
17
reference_url https://access.redhat.com/errata/RHSA-2023:1592
reference_id RHSA-2023:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1592
18
reference_url https://access.redhat.com/errata/RHSA-2023:1594
reference_id RHSA-2023:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1594
19
reference_url https://access.redhat.com/errata/RHSA-2023:1598
reference_id RHSA-2023:1598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1598
20
reference_url https://access.redhat.com/errata/RHSA-2023:1599
reference_id RHSA-2023:1599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1599
21
reference_url https://access.redhat.com/errata/RHSA-2023:1600
reference_id RHSA-2023:1600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1600
22
reference_url https://access.redhat.com/errata/RHSA-2023:6340
reference_id RHSA-2023:6340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6340
23
reference_url https://access.redhat.com/errata/RHSA-2023:6341
reference_id RHSA-2023:6341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6341
24
reference_url https://access.redhat.com/errata/RHSA-2023:6916
reference_id RHSA-2023:6916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6916
25
reference_url https://access.redhat.com/errata/RHSA-2023:6917
reference_id RHSA-2023:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6917
26
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
reference_id SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
reference_id SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
29
reference_url https://usn.ubuntu.com/5986-1/
reference_id USN-5986-1
reference_type
scores
url https://usn.ubuntu.com/5986-1/
fixed_packages
aliases CVE-2023-1393
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wp8b-r6p1-7kcf
17
url VCID-x3p6-a59z-ebf3
vulnerability_id VCID-x3p6-a59z-ebf3
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
reference_id
reference_type
scores
0
value 0.00958
scoring_system epss
scoring_elements 0.76482
published_at 2026-04-21T12:55:00Z
1
value 0.01113
scoring_system epss
scoring_elements 0.78283
published_at 2026-05-07T12:55:00Z
2
value 0.01113
scoring_system epss
scoring_elements 0.78257
published_at 2026-05-05T12:55:00Z
3
value 0.01143
scoring_system epss
scoring_elements 0.78499
published_at 2026-04-24T12:55:00Z
4
value 0.01143
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-26T12:55:00Z
5
value 0.01143
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-29T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.78996
published_at 2026-04-18T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-12T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78971
published_at 2026-04-13T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-16T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-02T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.78958
published_at 2026-04-04T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.78966
published_at 2026-04-08T12:55:00Z
13
value 0.01208
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-09T12:55:00Z
14
value 0.01208
scoring_system epss
scoring_elements 0.78941
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
reference_id 2253298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7886
reference_id RHSA-2023:7886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7886
8
reference_url https://access.redhat.com/errata/RHSA-2024:0006
reference_id RHSA-2024:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0006
9
reference_url https://access.redhat.com/errata/RHSA-2024:0009
reference_id RHSA-2024:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0009
10
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
11
reference_url https://access.redhat.com/errata/RHSA-2024:0014
reference_id RHSA-2024:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0014
12
reference_url https://access.redhat.com/errata/RHSA-2024:0015
reference_id RHSA-2024:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0015
13
reference_url https://access.redhat.com/errata/RHSA-2024:0016
reference_id RHSA-2024:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0016
14
reference_url https://access.redhat.com/errata/RHSA-2024:0017
reference_id RHSA-2024:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0017
15
reference_url https://access.redhat.com/errata/RHSA-2024:0018
reference_id RHSA-2024:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0018
16
reference_url https://access.redhat.com/errata/RHSA-2024:0020
reference_id RHSA-2024:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0020
17
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
18
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
19
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
20
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/6555-1/
reference_id USN-6555-1
reference_type
scores
url https://usn.ubuntu.com/6555-1/
23
reference_url https://usn.ubuntu.com/6555-2/
reference_id USN-6555-2
reference_type
scores
url https://usn.ubuntu.com/6555-2/
24
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
aliases CVE-2023-6478
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3p6-a59z-ebf3
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10%3Farch=13