{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","type":"deb","namespace":"debian","name":"tigervnc","version":"1.15.0+dfsg-2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49850?format=json","vulnerability_id":"VCID-2cqy-wq3e-dyat","summary":"Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26117","reference_id":"","reference_type":"","scores":[{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71863","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7182","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76123","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1882841","reference_id":"1882841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1882841"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272","reference_id":"971272","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272"},{"reference_url":"https://security.gentoo.org/glsa/202407-14","reference_id":"GLSA-202407-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1783","reference_id":"RHSA-2021:1783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1783"},{"reference_url":"https://usn.ubuntu.com/5965-1/","reference_id":"USN-5965-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5965-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941159?format=json","purl":"pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-26117"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cqy-wq3e-dyat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38391?format=json","vulnerability_id":"VCID-35c9-gt1z-6yfp","summary":"Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7395.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7395","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50996","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6516","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65046","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65166","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65176","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/TigerVNC/tigervnc/pull/436","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/TigerVNC/tigervnc/pull/436"},{"reference_url":"https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689"},{"reference_url":"http://www.securityfocus.com/bid/97305","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438701","reference_id":"1438701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438701"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259","reference_id":"859259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7395","reference_id":"CVE-2017-7395","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7395"},{"reference_url":"https://security.gentoo.org/glsa/201801-13","reference_id":"GLSA-201801-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2000","reference_id":"RHSA-2017:2000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941157?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7395"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35c9-gt1z-6yfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38392?format=json","vulnerability_id":"VCID-4ccf-xab2-nfg1","summary":"Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7396.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7396","reference_id":"","reference_type":"","scores":[{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.6412","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64156","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64168","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67104","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70256","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70248","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/TigerVNC/tigervnc/pull/436","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/TigerVNC/tigervnc/pull/436"},{"reference_url":"https://github.com/TigerVNC/tigervnc/pull/436/commits/dccb5f7d776e93863ae10bbff56a45c523c6eeb0","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/TigerVNC/tigervnc/pull/436/commits/dccb5f7d776e93863ae10bbff56a45c523c6eeb0"},{"reference_url":"http://www.securityfocus.com/bid/97305","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438703","reference_id":"1438703","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438703"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259","reference_id":"859259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7396","reference_id":"CVE-2017-7396","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7396"},{"reference_url":"https://security.gentoo.org/glsa/201801-13","reference_id":"GLSA-201801-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2000","reference_id":"RHSA-2017:2000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941157?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7396"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ccf-xab2-nfg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49849?format=json","vulnerability_id":"VCID-4kdt-7mph-j3ej","summary":"Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15695.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15695","reference_id":"","reference_type":"","scores":[{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87081","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.8713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87149","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.8715","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03257","scoring_system":"epss","scoring_elements":"0.87176","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790318","reference_id":"1790318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790318"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428","reference_id":"947428","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"},{"reference_url":"https://security.gentoo.org/glsa/202407-14","reference_id":"GLSA-202407-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1497","reference_id":"RHSA-2020:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3875","reference_id":"RHSA-2020:3875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941158?format=json","purl":"pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-15695"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kdt-7mph-j3ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49848?format=json","vulnerability_id":"VCID-58x9-2uk3-6bhp","summary":"Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15694.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15694.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15694","reference_id":"","reference_type":"","scores":[{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90668","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90678","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90703","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90728","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90737","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06012","scoring_system":"epss","scoring_elements":"0.90732","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790315","reference_id":"1790315","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790315"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428","reference_id":"947428","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"},{"reference_url":"https://security.gentoo.org/glsa/202407-14","reference_id":"GLSA-202407-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1497","reference_id":"RHSA-2020:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3875","reference_id":"RHSA-2020:3875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941158?format=json","purl":"pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-15694"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-58x9-2uk3-6bhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42295?format=json","vulnerability_id":"VCID-6ujy-cukz-dqfh","summary":"An integer overflow in TigerVNC might allow remote attackers to\n    execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8240.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8240","reference_id":"","reference_type":"","scores":[{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.78065","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.78003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.77985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.7802","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.78012","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.78044","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01094","scoring_system":"epss","scoring_elements":"0.78052","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240"},{"reference_url":"http://seclists.org/oss-sec/2014/q4/278","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q4/278"},{"reference_url":"http://seclists.org/oss-sec/2014/q4/300","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q4/300"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/96947","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/96947"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/70391","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70391"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1151307","reference_id":"1151307","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1151307"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849479","reference_id":"849479","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849479"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8240","reference_id":"CVE-2014-8240","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8240"},{"reference_url":"https://security.gentoo.org/glsa/201612-36","reference_id":"GLSA-201612-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-36"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2233","reference_id":"RHSA-2015:2233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2233"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941154?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2014-8240"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ujy-cukz-dqfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86099?format=json","vulnerability_id":"VCID-877z-wag9-xufy","summary":"tigervnc: NULL pointer dereference flaw in XRegion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8241.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8241","reference_id":"","reference_type":"","scores":[{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71867","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71875","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71916","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71939","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71922","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71951","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71936","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71985","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1151312","reference_id":"1151312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1151312"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849478","reference_id":"849478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2233","reference_id":"RHSA-2015:2233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2233"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941155?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2014-8241"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-877z-wag9-xufy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38389?format=json","vulnerability_id":"VCID-c64p-mvgq-h3ab","summary":"Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7394.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7394","reference_id":"","reference_type":"","scores":[{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01193","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02813","scoring_system":"epss","scoring_elements":"0.86161","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/TigerVNC/tigervnc/pull/440","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/TigerVNC/tigervnc/pull/440"},{"reference_url":"http://www.securityfocus.com/bid/97305","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438700","reference_id":"1438700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438700"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259","reference_id":"859259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7394","reference_id":"CVE-2017-7394","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7394"},{"reference_url":"https://security.gentoo.org/glsa/201801-13","reference_id":"GLSA-201801-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2000","reference_id":"RHSA-2017:2000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941157?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7394"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c64p-mvgq-h3ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38386?format=json","vulnerability_id":"VCID-eg3c-u9w7-23cj","summary":"Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7392.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7392","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62143","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6229","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62202","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62232","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62199","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62274","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62298","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/TigerVNC/tigervnc/pull/441","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/TigerVNC/tigervnc/pull/441"},{"reference_url":"http://www.securityfocus.com/bid/97305","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438694","reference_id":"1438694","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438694"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259","reference_id":"859259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7392","reference_id":"CVE-2017-7392","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7392"},{"reference_url":"https://security.gentoo.org/glsa/201801-13","reference_id":"GLSA-201801-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2000","reference_id":"RHSA-2017:2000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941157?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7392"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eg3c-u9w7-23cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87401?format=json","vulnerability_id":"VCID-kme1-gr1m-zfh8","summary":"tigervnc: vncviewer can send password to server without proper validation of the X.509 certificate","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060567.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060567.html"},{"reference_url":"http://openwall.com/lists/oss-security/2011/05/06/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/05/06/2"},{"reference_url":"http://openwall.com/lists/oss-security/2011/05/09/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/05/09/7"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1775.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1775","reference_id":"","reference_type":"","scores":[{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64998","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64894","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64938","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64974","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.6497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65002","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1775"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=702672","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=702672"},{"reference_url":"http://secunia.com/advisories/44939","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44939"},{"reference_url":"http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01342.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01342.html"},{"reference_url":"http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01345.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01345.html"},{"reference_url":"http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01347.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01347.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0871.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0871.html"},{"reference_url":"http://www.securityfocus.com/bid/47738","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47738"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=702470","reference_id":"702470","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=702470"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1775","reference_id":"CVE-2011-1775","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0871","reference_id":"RHSA-2011:0871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0871"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941151?format=json","purl":"pkg:deb/debian/tigervnc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2011-1775"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kme1-gr1m-zfh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38388?format=json","vulnerability_id":"VCID-p8yq-vpuh-nkg4","summary":"Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7393.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7393","reference_id":"","reference_type":"","scores":[{"value":"0.01187","scoring_system":"epss","scoring_elements":"0.78876","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01187","scoring_system":"epss","scoring_elements":"0.78853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01187","scoring_system":"epss","scoring_elements":"0.7886","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.839","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.8383","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83855","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83901","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/TigerVNC/tigervnc/pull/438","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/TigerVNC/tigervnc/pull/438"},{"reference_url":"http://www.securityfocus.com/bid/97305","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438697","reference_id":"1438697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1438697"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259","reference_id":"859259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7393","reference_id":"CVE-2017-7393","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7393"},{"reference_url":"https://security.gentoo.org/glsa/201801-13","reference_id":"GLSA-201801-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2000","reference_id":"RHSA-2017:2000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941157?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7393"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p8yq-vpuh-nkg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50874?format=json","vulnerability_id":"VCID-ts81-hqju-7bdu","summary":"A buffer overflow in TigerVNC might allow remote attackers to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5581.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5581","reference_id":"","reference_type":"","scores":[{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86936","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86986","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86999","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.86988","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.8703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87032","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1415712","reference_id":"1415712","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1415712"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852213","reference_id":"852213","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852213"},{"reference_url":"https://security.gentoo.org/glsa/201702-19","reference_id":"GLSA-201702-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0630","reference_id":"RHSA-2017:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2000","reference_id":"RHSA-2017:2000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941156?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-5581"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ts81-hqju-7bdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61861?format=json","vulnerability_id":"VCID-u17b-f4ew-dudp","summary":"A buffer overflow in TigerVNC could result in execution of\n    arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0011.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0011","reference_id":"","reference_type":"","scores":[{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67854","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.6794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67964","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.6795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67952","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.7886","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0011"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1050928","reference_id":"1050928","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1050928"},{"reference_url":"https://security.gentoo.org/glsa/201411-03","reference_id":"GLSA-201411-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941151?format=json","purl":"pkg:deb/debian/tigervnc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2014-0011"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u17b-f4ew-dudp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81715?format=json","vulnerability_id":"VCID-vgaa-3fm8-bbdq","summary":"tigervnc: Heap buffer overflow in TightDecoder::FilterGradient","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15693.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15693","reference_id":"","reference_type":"","scores":[{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92591","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.9261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08956","scoring_system":"epss","scoring_elements":"0.92615","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790313","reference_id":"1790313","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790313"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428","reference_id":"947428","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1497","reference_id":"RHSA-2020:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3875","reference_id":"RHSA-2020:3875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941158?format=json","purl":"pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-15693"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vgaa-3fm8-bbdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38385?format=json","vulnerability_id":"VCID-vz9s-w84f-efb7","summary":"Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10207.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10207","reference_id":"","reference_type":"","scores":[{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.8221","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.8226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82261","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82299","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418761","reference_id":"1418761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418761"},{"reference_url":"https://security.gentoo.org/glsa/201801-13","reference_id":"GLSA-201801-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0630","reference_id":"RHSA-2017:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2000","reference_id":"RHSA-2017:2000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941154?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-10207"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vz9s-w84f-efb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49846?format=json","vulnerability_id":"VCID-wspa-k6wk-kqhb","summary":"Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15691.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15691","reference_id":"","reference_type":"","scores":[{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87936","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87929","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.8796","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03684","scoring_system":"epss","scoring_elements":"0.87966","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789908","reference_id":"1789908","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789908"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428","reference_id":"947428","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"},{"reference_url":"https://security.gentoo.org/glsa/202407-14","reference_id":"GLSA-202407-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1497","reference_id":"RHSA-2020:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3875","reference_id":"RHSA-2020:3875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941158?format=json","purl":"pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-15691"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wspa-k6wk-kqhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49847?format=json","vulnerability_id":"VCID-yvqe-mjea-pud2","summary":"Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15692.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15692.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15692","reference_id":"","reference_type":"","scores":[{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89719","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89737","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89739","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89763","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89785","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05042","scoring_system":"epss","scoring_elements":"0.89786","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789527","reference_id":"1789527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789527"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428","reference_id":"947428","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"},{"reference_url":"https://security.gentoo.org/glsa/202407-14","reference_id":"GLSA-202407-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1497","reference_id":"RHSA-2020:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3875","reference_id":"RHSA-2020:3875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941158?format=json","purl":"pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-15692"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yvqe-mjea-pud2"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"}