Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942076?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "veyon", "version": "4.5.3+repack1-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.7.5+repack1-1", "latest_non_vulnerable_version": "4.9.7+repack1-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41297?format=api", "vulnerability_id": "VCID-1d5d-ajfs-tffv", "summary": "Multiple vulnerabilities have been found in\n LibVNCServer/LibVNCClient, the worst of which allows remote attackers to\n execute arbitrary code when connecting to a malicious server.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9941", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74728", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74722", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74724", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74602", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74628", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74634", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74649", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.7468", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74688", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74715", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410166", "reference_id": "1410166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410166" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007", "reference_id": "850007", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007" }, { "reference_url": "https://security.archlinux.org/ASA-201701-20", "reference_id": "ASA-201701-20", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-20" }, { "reference_url": "https://security.archlinux.org/AVG-124", "reference_id": "AVG-124", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-124" }, { "reference_url": "https://security.gentoo.org/glsa/201702-24", "reference_id": "GLSA-201702-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-24" }, { "reference_url": "https://usn.ubuntu.com/3171-1/", "reference_id": "USN-3171-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3171-1/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9941" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1d5d-ajfs-tffv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41298?format=api", "vulnerability_id": "VCID-377b-31s1-b3ek", "summary": "Multiple vulnerabilities have been found in\n LibVNCServer/LibVNCClient, the worst of which allows remote attackers to\n execute arbitrary code when connecting to a malicious server.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74728", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74722", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74724", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74602", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74628", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74634", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74649", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.7468", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74688", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74715", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410168", "reference_id": "1410168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410168" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008", "reference_id": "850008", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008" }, { "reference_url": "https://security.archlinux.org/ASA-201701-20", "reference_id": "ASA-201701-20", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-20" }, { "reference_url": "https://security.archlinux.org/AVG-124", "reference_id": "AVG-124", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-124" }, { "reference_url": "https://security.gentoo.org/glsa/201702-24", "reference_id": "GLSA-201702-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-24" }, { "reference_url": "https://usn.ubuntu.com/3171-1/", "reference_id": "USN-3171-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3171-1/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9942" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-377b-31s1-b3ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30944?format=api", "vulnerability_id": "VCID-3817-suhy-xfhd", "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20020", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95621", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95624", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95636", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95641", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.9564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95651", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95655", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95656", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95657", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95659", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.2103", "scoring_system": "epss", "scoring_elements": "0.95673", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661117", "reference_id": "1661117", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661117" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941", "reference_id": "916941", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827", "reference_id": "945827", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827" }, { "reference_url": "https://security.gentoo.org/glsa/201908-05", "reference_id": "GLSA-201908-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-05" }, { "reference_url": "https://security.gentoo.org/glsa/202006-06", "reference_id": "GLSA-202006-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-06" }, { "reference_url": "https://usn.ubuntu.com/3877-1/", "reference_id": "USN-3877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3877-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-1/", "reference_id": "USN-4547-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-2/", "reference_id": "USN-4547-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-2/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-20020" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3817-suhy-xfhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/218082?format=api", "vulnerability_id": "VCID-6gg4-xtn1-3ba9", "summary": "On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15261", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92097", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92111", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92127", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.9213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92134", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92141", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92138", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92142", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92139", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08057", "scoring_system": "epss", "scoring_elements": "0.92149", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15261" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt", "reference_id": "CVE-2020-15261", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942080?format=api", "purl": "pkg:deb/debian/veyon@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-15261" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gg4-xtn1-3ba9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38630?format=api", "vulnerability_id": "VCID-9nha-t527-rfhs", "summary": "Multiple vulnerabilities have been found in LibVNCServer, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20023", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74921", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.7495", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74992", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74971", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74998", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.75005", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.74995", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.75033", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.75038", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.75041", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00856", "scoring_system": "epss", "scoring_elements": "0.75048", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661128", "reference_id": "1661128", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661128" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941", "reference_id": "916941", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941" }, { "reference_url": "https://security.gentoo.org/glsa/201908-05", "reference_id": "GLSA-201908-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-05" }, { "reference_url": "https://usn.ubuntu.com/3877-1/", "reference_id": "USN-3877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3877-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-1/", "reference_id": "USN-4547-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-1/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-20023" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nha-t527-rfhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30946?format=api", "vulnerability_id": "VCID-bngs-4nkn-rbh1", "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20022", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.9079", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90818", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90829", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90844", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90866", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90864", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90863", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90877", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90875", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90873", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06177", "scoring_system": "epss", "scoring_elements": "0.90888", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661123", "reference_id": "1661123", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661123" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941", "reference_id": "916941", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827", "reference_id": "945827", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827" }, { "reference_url": "https://security.gentoo.org/glsa/201908-05", "reference_id": "GLSA-201908-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-05" }, { "reference_url": "https://security.gentoo.org/glsa/202006-06", "reference_id": "GLSA-202006-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-06" }, { "reference_url": "https://usn.ubuntu.com/3877-1/", "reference_id": "USN-3877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3877-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-1/", "reference_id": "USN-4547-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-2/", "reference_id": "USN-4547-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-2/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-20022" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bngs-4nkn-rbh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30945?format=api", "vulnerability_id": "VCID-du88-cbhp-rkcc", "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20021", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85421", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85499", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85498", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85494", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85518", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85522", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85519", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85541", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.8555", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85548", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02552", "scoring_system": "epss", "scoring_elements": "0.85566", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661120", "reference_id": "1661120", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661120" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941", "reference_id": "916941", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827", "reference_id": "945827", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827" }, { "reference_url": "https://security.gentoo.org/glsa/201908-05", "reference_id": "GLSA-201908-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-05" }, { "reference_url": "https://security.gentoo.org/glsa/202006-06", "reference_id": "GLSA-202006-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-06" }, { "reference_url": "https://usn.ubuntu.com/3877-1/", "reference_id": "USN-3877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3877-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-1/", "reference_id": "USN-4547-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-2/", "reference_id": "USN-4547-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-2/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-20021" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-du88-cbhp-rkcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57887?format=api", "vulnerability_id": "VCID-nrnp-2yeq-y7ap", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.9001", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89927", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89943", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.8995", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89979", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89977", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89985", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89986", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89982", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89999", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89998", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0524", "scoring_system": "epss", "scoring_elements": "0.89997", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6052" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" }, { "reference_url": "http://seclists.org/oss-sec/2014/q3/639", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/oss-sec/2014/q3/639" }, { "reference_url": "http://secunia.com/advisories/61506", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61506" }, { "reference_url": "http://secunia.com/advisories/61682", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61682" }, { "reference_url": "https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" }, { "reference_url": "http://ubuntu.com/usn/usn-2365-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-2365-1" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3081", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3081" }, { "reference_url": "http://www.ocert.org/advisories/ocert-2014-007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ocert.org/advisories/ocert-2014-007.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/25/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "reference_url": "http://www.securityfocus.com/bid/70091", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70091" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144288", "reference_id": "1144288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144288" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745", "reference_id": "762745", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6052", "reference_id": "CVE-2014-6052", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6052" }, { "reference_url": "https://security.gentoo.org/glsa/201507-07", "reference_id": "GLSA-201507-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1826", "reference_id": "RHSA-2014:1826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1826" }, { "reference_url": "https://usn.ubuntu.com/2365-1/", "reference_id": "USN-2365-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2365-1/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-6052" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrnp-2yeq-y7ap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82899?format=api", "vulnerability_id": "VCID-p9tk-fn6b-cbbv", "summary": "libvncserver: Multiple heap out-of-bound writes in VNC client code (Incomplete fix for CVE-2018-20019)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20748.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20748.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20748", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93254", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93259", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93267", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93275", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93273", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93292", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93297", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93304", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.9331", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93307", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93302", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10572", "scoring_system": "epss", "scoring_elements": "0.93308", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671407", "reference_id": "1671407", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671407" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920941", "reference_id": "920941", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920941" }, { "reference_url": "https://usn.ubuntu.com/3877-1/", "reference_id": "USN-3877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3877-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-1/", "reference_id": "USN-4547-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-1/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942079?format=api", "purl": "pkg:deb/debian/veyon@4.1.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.7%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-20748" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9tk-fn6b-cbbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30947?format=api", "vulnerability_id": "VCID-q89b-2emb-j3br", "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20024", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.87937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.87947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.8796", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.87964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.87984", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.87991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.88002", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.87995", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.87994", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.88008", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.88007", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.88023", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.88029", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03729", "scoring_system": "epss", "scoring_elements": "0.8804", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661132", "reference_id": "1661132", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661132" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941", "reference_id": "916941", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827", "reference_id": "945827", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827" }, { "reference_url": "https://security.gentoo.org/glsa/201908-05", "reference_id": "GLSA-201908-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-05" }, { "reference_url": "https://security.gentoo.org/glsa/202006-06", "reference_id": "GLSA-202006-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-06" }, { "reference_url": "https://usn.ubuntu.com/3877-1/", "reference_id": "USN-3877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3877-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-1/", "reference_id": "USN-4547-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-1/" }, { "reference_url": "https://usn.ubuntu.com/4547-2/", "reference_id": "USN-4547-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4547-2/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-20024" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q89b-2emb-j3br" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42294?format=api", "vulnerability_id": "VCID-ug79-puqk-33ce", "summary": "An integer overflow in TigerVNC might allow remote attackers to\n execute\n arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0113.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0113.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6051", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91224", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91123", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91136", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91157", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91164", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91171", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91174", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.912", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91213", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.91211", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06605", "scoring_system": "epss", "scoring_elements": "0.9121", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6051" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" }, { "reference_url": "http://seclists.org/oss-sec/2014/q3/639", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/oss-sec/2014/q3/639" }, { "reference_url": "http://secunia.com/advisories/61506", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61506" }, { "reference_url": "https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" }, { "reference_url": "https://www.kde.org/info/security/advisory-20140923-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kde.org/info/security/advisory-20140923-1.txt" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3081", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3081" }, { "reference_url": "http://www.ocert.org/advisories/ocert-2014-007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ocert.org/advisories/ocert-2014-007.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/25/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "reference_url": "http://www.securityfocus.com/bid/70093", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70093" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144287", "reference_id": "1144287", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745", "reference_id": "762745", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6051", "reference_id": "CVE-2014-6051", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6051" }, { "reference_url": "https://security.gentoo.org/glsa/201507-07", "reference_id": "GLSA-201507-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-07" }, { "reference_url": "https://security.gentoo.org/glsa/201612-36", "reference_id": "GLSA-201612-36", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-36" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1826", "reference_id": "RHSA-2014:1826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0113", "reference_id": "RHSA-2015:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0113" }, { "reference_url": "https://usn.ubuntu.com/2365-1/", "reference_id": "USN-2365-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2365-1/" }, { "reference_url": "https://usn.ubuntu.com/4587-1/", "reference_id": "USN-4587-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4587-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api", "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api", "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api", "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api", "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api", "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-6051" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ug79-puqk-33ce" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie" }