Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
Typedeb
Namespacedebian
Namexorg-server
Version2:1.20.11-1+deb11u13
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:1.20.11-1+deb11u14
Latest_non_vulnerable_version2:21.1.22-1
Affected_by_vulnerabilities
0
url VCID-3f4a-m4rt-qqej
vulnerability_id VCID-3f4a-m4rt-qqej
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34002.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34002.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34002
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-05-07T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07403
published_at 2026-05-09T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0831
published_at 2026-05-12T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08364
published_at 2026-05-14T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.0828
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34002
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34002
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451112
reference_id 2451112
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-06T14:27:00Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451112
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2026-34002
reference_id CVE-2026-34002
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-06T14:27:00Z/
url https://access.redhat.com/security/cve/CVE-2026-34002
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2026-34002
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3f4a-m4rt-qqej
1
url VCID-b14x-4mtq-5fc7
vulnerability_id VCID-b14x-4mtq-5fc7
summary In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49737
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26184
published_at 2026-05-14T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26103
published_at 2026-05-12T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26086
published_at 2026-05-11T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.2616
published_at 2026-05-09T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26219
published_at 2026-04-24T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26106
published_at 2026-05-07T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26042
published_at 2026-05-05T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26161
published_at 2026-04-29T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26212
published_at 2026-04-26T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.4199
published_at 2026-04-21T12:55:00Z
10
value 0.00199
scoring_system epss
scoring_elements 0.42097
published_at 2026-04-11T12:55:00Z
11
value 0.00199
scoring_system epss
scoring_elements 0.42046
published_at 2026-04-02T12:55:00Z
12
value 0.00199
scoring_system epss
scoring_elements 0.42074
published_at 2026-04-04T12:55:00Z
13
value 0.00199
scoring_system epss
scoring_elements 0.42011
published_at 2026-04-07T12:55:00Z
14
value 0.00199
scoring_system epss
scoring_elements 0.42063
published_at 2026-04-08T12:55:00Z
15
value 0.00199
scoring_system epss
scoring_elements 0.42075
published_at 2026-04-09T12:55:00Z
16
value 0.00199
scoring_system epss
scoring_elements 0.42059
published_at 2026-04-18T12:55:00Z
17
value 0.00199
scoring_system epss
scoring_elements 0.42034
published_at 2026-04-13T12:55:00Z
18
value 0.00199
scoring_system epss
scoring_elements 0.42085
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49737
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49737
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/issues/1260
reference_id 1260
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/issues/1260
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5
reference_id bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/
url https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081338
reference_id bugreport.cgi?bug=1081338
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081338
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/dc7cb45482cea6ccec22d117ca0b489500b4d0a0
reference_id dc7cb45482cea6ccec22d117ca0b489500b4d0a0
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-17T16:07:10Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/dc7cb45482cea6ccec22d117ca0b489500b4d0a0
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.16-1.1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-49737
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b14x-4mtq-5fc7
2
url VCID-cxf3-8znp-rbbz
vulnerability_id VCID-cxf3-8znp-rbbz
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3553
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30833
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30265
published_at 2026-05-14T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30305
published_at 2026-04-29T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30167
published_at 2026-05-05T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30238
published_at 2026-05-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30246
published_at 2026-05-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30172
published_at 2026-05-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30194
published_at 2026-05-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30879
published_at 2026-04-04T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-07T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30756
published_at 2026-04-08T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30788
published_at 2026-04-09T12:55:00Z
12
value 0.00118
scoring_system epss
scoring_elements 0.30791
published_at 2026-04-11T12:55:00Z
13
value 0.00118
scoring_system epss
scoring_elements 0.30747
published_at 2026-04-12T12:55:00Z
14
value 0.00118
scoring_system epss
scoring_elements 0.307
published_at 2026-04-13T12:55:00Z
15
value 0.00118
scoring_system epss
scoring_elements 0.30725
published_at 2026-04-16T12:55:00Z
16
value 0.00118
scoring_system epss
scoring_elements 0.30705
published_at 2026-04-18T12:55:00Z
17
value 0.00118
scoring_system epss
scoring_elements 0.30671
published_at 2026-04-21T12:55:00Z
18
value 0.00118
scoring_system epss
scoring_elements 0.30499
published_at 2026-04-24T12:55:00Z
19
value 0.00118
scoring_system epss
scoring_elements 0.30387
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140706
reference_id 2140706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140706
4
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/
url https://security.gentoo.org/glsa/202305-30
5
reference_url https://vuldb.com/?id.211053
reference_id ?id.211053
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/
url https://vuldb.com/?id.211053
6
reference_url https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3
reference_id ?id=dfd057996b26420309c324ec844a5ba6dd07eda3
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/
url https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-3553
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxf3-8znp-rbbz
3
url VCID-hxab-xyu1-xkgc
vulnerability_id VCID-hxab-xyu1-xkgc
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34000.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34000
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-05-07T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07403
published_at 2026-05-09T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0831
published_at 2026-05-12T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08364
published_at 2026-05-14T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.0828
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34000
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451107
reference_id 2451107
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-05T18:51:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451107
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2026-34000
reference_id CVE-2026-34000
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-05T18:51:27Z/
url https://access.redhat.com/security/cve/CVE-2026-34000
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2026-34000
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxab-xyu1-xkgc
4
url VCID-pa9n-ntq3-jqaz
vulnerability_id VCID-pa9n-ntq3-jqaz
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34003.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34003.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34003
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01694
published_at 2026-05-14T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01752
published_at 2026-04-24T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01747
published_at 2026-04-26T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01962
published_at 2026-04-29T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01698
published_at 2026-05-11T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.0169
published_at 2026-05-07T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01697
published_at 2026-05-09T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01685
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34003
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34003
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451113
reference_id 2451113
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451113
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-34003
reference_id CVE-2026-34003
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/security/cve/CVE-2026-34003
16
reference_url https://access.redhat.com/errata/RHSA-2026:10739
reference_id RHSA-2026:10739
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:10739
17
reference_url https://access.redhat.com/errata/RHSA-2026:11352
reference_id RHSA-2026:11352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11352
18
reference_url https://access.redhat.com/errata/RHSA-2026:11369
reference_id RHSA-2026:11369
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11369
19
reference_url https://access.redhat.com/errata/RHSA-2026:11388
reference_id RHSA-2026:11388
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11388
20
reference_url https://access.redhat.com/errata/RHSA-2026:11656
reference_id RHSA-2026:11656
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11656
21
reference_url https://access.redhat.com/errata/RHSA-2026:11692
reference_id RHSA-2026:11692
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11692
22
reference_url https://access.redhat.com/errata/RHSA-2026:13414
reference_id RHSA-2026:13414
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:13414
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2026-34003
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pa9n-ntq3-jqaz
5
url VCID-wzer-jnm3-rqa8
vulnerability_id VCID-wzer-jnm3-rqa8
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33999.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33999.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33999
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01566
published_at 2026-05-14T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01781
published_at 2026-04-24T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01776
published_at 2026-04-26T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01819
published_at 2026-04-29T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01571
published_at 2026-05-05T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.0156
published_at 2026-05-09T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01558
published_at 2026-05-11T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01554
published_at 2026-05-12T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01565
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33999
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33999
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451106
reference_id 2451106
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451106
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-33999
reference_id CVE-2026-33999
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/security/cve/CVE-2026-33999
16
reference_url https://access.redhat.com/errata/RHSA-2026:10739
reference_id RHSA-2026:10739
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:10739
17
reference_url https://access.redhat.com/errata/RHSA-2026:11352
reference_id RHSA-2026:11352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11352
18
reference_url https://access.redhat.com/errata/RHSA-2026:11369
reference_id RHSA-2026:11369
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11369
19
reference_url https://access.redhat.com/errata/RHSA-2026:11388
reference_id RHSA-2026:11388
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11388
20
reference_url https://access.redhat.com/errata/RHSA-2026:11656
reference_id RHSA-2026:11656
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11656
21
reference_url https://access.redhat.com/errata/RHSA-2026:11692
reference_id RHSA-2026:11692
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11692
22
reference_url https://access.redhat.com/errata/RHSA-2026:13414
reference_id RHSA-2026:13414
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:13414
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2026-33999
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wzer-jnm3-rqa8
6
url VCID-x3dk-fny6-fqa5
vulnerability_id VCID-x3dk-fny6-fqa5
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34001.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34001
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02701
published_at 2026-05-12T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02741
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02727
published_at 2026-05-14T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02643
published_at 2026-05-05T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02661
published_at 2026-05-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-05-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.027
published_at 2026-05-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03012
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34001
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451109
reference_id 2451109
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451109
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-34001
reference_id CVE-2026-34001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/security/cve/CVE-2026-34001
16
reference_url https://access.redhat.com/errata/RHSA-2026:10739
reference_id RHSA-2026:10739
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:10739
17
reference_url https://access.redhat.com/errata/RHSA-2026:11352
reference_id RHSA-2026:11352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11352
18
reference_url https://access.redhat.com/errata/RHSA-2026:11369
reference_id RHSA-2026:11369
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11369
19
reference_url https://access.redhat.com/errata/RHSA-2026:11388
reference_id RHSA-2026:11388
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11388
20
reference_url https://access.redhat.com/errata/RHSA-2026:11656
reference_id RHSA-2026:11656
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11656
21
reference_url https://access.redhat.com/errata/RHSA-2026:11692
reference_id RHSA-2026:11692
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11692
22
reference_url https://access.redhat.com/errata/RHSA-2026:13414
reference_id RHSA-2026:13414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13414
fixed_packages
0
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2026-34001
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3dk-fny6-fqa5
Fixing_vulnerabilities
0
url VCID-1742-kcnn-pyg5
vulnerability_id VCID-1742-kcnn-pyg5
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14361
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46091
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46131
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46151
published_at 2026-04-04T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46098
published_at 2026-04-07T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46154
published_at 2026-04-21T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46152
published_at 2026-04-09T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46175
published_at 2026-04-11T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46147
published_at 2026-04-12T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46156
published_at 2026-04-13T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46213
published_at 2026-04-16T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.4621
published_at 2026-04-18T12:55:00Z
11
value 0.00233
scoring_system epss
scoring_elements 0.46134
published_at 2026-04-24T12:55:00Z
12
value 0.00233
scoring_system epss
scoring_elements 0.46143
published_at 2026-04-26T12:55:00Z
13
value 0.00233
scoring_system epss
scoring_elements 0.46084
published_at 2026-04-29T12:55:00Z
14
value 0.00233
scoring_system epss
scoring_elements 0.45986
published_at 2026-05-05T12:55:00Z
15
value 0.00233
scoring_system epss
scoring_elements 0.46049
published_at 2026-05-07T12:55:00Z
16
value 0.00233
scoring_system epss
scoring_elements 0.46067
published_at 2026-05-09T12:55:00Z
17
value 0.00233
scoring_system epss
scoring_elements 0.46007
published_at 2026-05-11T12:55:00Z
18
value 0.00233
scoring_system epss
scoring_elements 0.46035
published_at 2026-05-12T12:55:00Z
19
value 0.00233
scoring_system epss
scoring_elements 0.46108
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869142
reference_id 1869142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869142
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
14
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2020-14361
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1742-kcnn-pyg5
1
url VCID-1cjg-y5qm-sffh
vulnerability_id VCID-1cjg-y5qm-sffh
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4008
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22403
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22377
published_at 2026-05-14T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.2231
published_at 2026-05-09T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22278
published_at 2026-05-11T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22295
published_at 2026-05-12T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.2257
published_at 2026-04-02T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-04T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.224
published_at 2026-04-07T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22481
published_at 2026-04-08T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22536
published_at 2026-04-09T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22555
published_at 2026-04-11T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22514
published_at 2026-04-12T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-13T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-16T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22471
published_at 2026-04-18T12:55:00Z
15
value 0.00074
scoring_system epss
scoring_elements 0.22421
published_at 2026-04-21T12:55:00Z
16
value 0.00074
scoring_system epss
scoring_elements 0.22269
published_at 2026-04-24T12:55:00Z
17
value 0.00074
scoring_system epss
scoring_elements 0.22255
published_at 2026-04-26T12:55:00Z
18
value 0.00074
scoring_system epss
scoring_elements 0.2225
published_at 2026-04-29T12:55:00Z
19
value 0.00074
scoring_system epss
scoring_elements 0.22148
published_at 2026-05-05T12:55:00Z
20
value 0.00074
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026059
reference_id 2026059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026059
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2021-4008
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjg-y5qm-sffh
2
url VCID-1pcv-f5h3-9fe9
vulnerability_id VCID-1pcv-f5h3-9fe9
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26595
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0809
published_at 2026-05-05T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08293
published_at 2026-05-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08223
published_at 2026-05-07T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
15
value 0.00034
scoring_system epss
scoring_elements 0.10297
published_at 2026-05-14T12:55:00Z
16
value 0.00034
scoring_system epss
scoring_elements 0.102
published_at 2026-05-11T12:55:00Z
17
value 0.00034
scoring_system epss
scoring_elements 0.10239
published_at 2026-05-12T12:55:00Z
18
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
19
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345257
reference_id 2345257
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345257
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26595
reference_id CVE-2025-26595
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/security/cve/CVE-2025-26595
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26595
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pcv-f5h3-9fe9
3
url VCID-1xa1-uf4t-z3bs
vulnerability_id VCID-1xa1-uf4t-z3bs
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12177
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.7654
published_at 2026-05-14T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76487
published_at 2026-05-09T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.76475
published_at 2026-05-11T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.7649
published_at 2026-05-12T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-16T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76411
published_at 2026-04-18T12:55:00Z
14
value 0.0095
scoring_system epss
scoring_elements 0.76396
published_at 2026-04-21T12:55:00Z
15
value 0.0095
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-24T12:55:00Z
16
value 0.0095
scoring_system epss
scoring_elements 0.76436
published_at 2026-04-26T12:55:00Z
17
value 0.0095
scoring_system epss
scoring_elements 0.7645
published_at 2026-04-29T12:55:00Z
18
value 0.0095
scoring_system epss
scoring_elements 0.76438
published_at 2026-05-05T12:55:00Z
19
value 0.0095
scoring_system epss
scoring_elements 0.76467
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12177
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509218
reference_id 1509218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509218
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12177
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xa1-uf4t-z3bs
4
url VCID-28er-gwh3-rugq
vulnerability_id VCID-28er-gwh3-rugq
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30026
published_at 2026-05-14T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.3409
published_at 2026-04-04T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33947
published_at 2026-04-07T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.33989
published_at 2026-04-08T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34021
published_at 2026-04-09T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.3402
published_at 2026-04-11T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.33978
published_at 2026-04-12T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.33464
published_at 2026-05-07T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-02T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33395
published_at 2026-05-05T12:55:00Z
10
value 0.00139
scoring_system epss
scoring_elements 0.3344
published_at 2026-05-12T12:55:00Z
11
value 0.00139
scoring_system epss
scoring_elements 0.33416
published_at 2026-05-11T12:55:00Z
12
value 0.00139
scoring_system epss
scoring_elements 0.33505
published_at 2026-05-09T12:55:00Z
13
value 0.00139
scoring_system epss
scoring_elements 0.33954
published_at 2026-04-13T12:55:00Z
14
value 0.00148
scoring_system epss
scoring_elements 0.35239
published_at 2026-04-16T12:55:00Z
15
value 0.00148
scoring_system epss
scoring_elements 0.34833
published_at 2026-04-29T12:55:00Z
16
value 0.00148
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-26T12:55:00Z
17
value 0.00148
scoring_system epss
scoring_elements 0.34942
published_at 2026-04-24T12:55:00Z
18
value 0.00148
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-21T12:55:00Z
19
value 0.00148
scoring_system epss
scoring_elements 0.35225
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
reference_id 2151757
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46342
reference_id CVE-2022-46342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://access.redhat.com/security/cve/CVE-2022-46342
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-46342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq
5
url VCID-2cp3-p3yx-17be
vulnerability_id VCID-2cp3-p3yx-17be
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49180
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-08T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18079
published_at 2026-04-04T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1778
published_at 2026-04-07T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17986
published_at 2026-04-02T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-09T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-11T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17899
published_at 2026-04-12T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.30765
published_at 2026-05-05T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.30842
published_at 2026-05-09T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.31292
published_at 2026-04-21T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.3112
published_at 2026-04-24T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.30998
published_at 2026-04-26T12:55:00Z
12
value 0.00122
scoring_system epss
scoring_elements 0.30915
published_at 2026-04-29T12:55:00Z
13
value 0.00122
scoring_system epss
scoring_elements 0.30834
published_at 2026-05-07T12:55:00Z
14
value 0.00147
scoring_system epss
scoring_elements 0.34558
published_at 2026-05-11T12:55:00Z
15
value 0.00147
scoring_system epss
scoring_elements 0.34651
published_at 2026-05-14T12:55:00Z
16
value 0.00147
scoring_system epss
scoring_elements 0.34584
published_at 2026-05-12T12:55:00Z
17
value 0.00154
scoring_system epss
scoring_elements 0.36105
published_at 2026-04-18T12:55:00Z
18
value 0.00154
scoring_system epss
scoring_elements 0.36079
published_at 2026-04-13T12:55:00Z
19
value 0.00154
scoring_system epss
scoring_elements 0.3612
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369981
reference_id 2369981
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369981
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6
reference_id 3c3a4b767b16174d3213055947ea7f4f88e10ec6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://access.redhat.com/security/cve/CVE-2025-49180
reference_id CVE-2025-49180
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/security/cve/CVE-2025-49180
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
60
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-49180
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cp3-p3yx-17be
6
url VCID-2u2q-xxe5-q7e9
vulnerability_id VCID-2u2q-xxe5-q7e9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://osvdb.org/34905
reference_id
reference_type
scores
url http://osvdb.org/34905
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2437.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2437.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2437
reference_id
reference_type
scores
0
value 0.03757
scoring_system epss
scoring_elements 0.88153
published_at 2026-05-14T12:55:00Z
1
value 0.03757
scoring_system epss
scoring_elements 0.87977
published_at 2026-04-01T12:55:00Z
2
value 0.03757
scoring_system epss
scoring_elements 0.87987
published_at 2026-04-02T12:55:00Z
3
value 0.03757
scoring_system epss
scoring_elements 0.88001
published_at 2026-04-04T12:55:00Z
4
value 0.03757
scoring_system epss
scoring_elements 0.88006
published_at 2026-04-07T12:55:00Z
5
value 0.03757
scoring_system epss
scoring_elements 0.88026
published_at 2026-04-08T12:55:00Z
6
value 0.03757
scoring_system epss
scoring_elements 0.88032
published_at 2026-04-09T12:55:00Z
7
value 0.03757
scoring_system epss
scoring_elements 0.88042
published_at 2026-04-11T12:55:00Z
8
value 0.03757
scoring_system epss
scoring_elements 0.88035
published_at 2026-04-13T12:55:00Z
9
value 0.03757
scoring_system epss
scoring_elements 0.88049
published_at 2026-04-16T12:55:00Z
10
value 0.03757
scoring_system epss
scoring_elements 0.88047
published_at 2026-04-18T12:55:00Z
11
value 0.03757
scoring_system epss
scoring_elements 0.88048
published_at 2026-04-21T12:55:00Z
12
value 0.03757
scoring_system epss
scoring_elements 0.88065
published_at 2026-04-24T12:55:00Z
13
value 0.03757
scoring_system epss
scoring_elements 0.88071
published_at 2026-04-29T12:55:00Z
14
value 0.03757
scoring_system epss
scoring_elements 0.88083
published_at 2026-05-05T12:55:00Z
15
value 0.03757
scoring_system epss
scoring_elements 0.88098
published_at 2026-05-07T12:55:00Z
16
value 0.03757
scoring_system epss
scoring_elements 0.88112
published_at 2026-05-09T12:55:00Z
17
value 0.03757
scoring_system epss
scoring_elements 0.8811
published_at 2026-05-11T12:55:00Z
18
value 0.03757
scoring_system epss
scoring_elements 0.88124
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2437
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2437
4
reference_url http://secunia.com/advisories/25121
reference_id
reference_type
scores
url http://secunia.com/advisories/25121
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33976
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33976
6
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102901-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102901-1
7
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200067-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200067-1
8
reference_url http://www.rapid7.com/advisories/R7-0027.jsp
reference_id
reference_type
scores
url http://www.rapid7.com/advisories/R7-0027.jsp
9
reference_url http://www.securityfocus.com/bid/23741
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23741
10
reference_url http://www.securitytracker.com/id?1017984
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017984
11
reference_url http://www.vupen.com/english/advisories/2007/1601
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1601
12
reference_url http://www.vupen.com/english/advisories/2007/1658
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1658
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422936
reference_id 422936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422936
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xserver:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_window_system:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_window_system:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_window_system:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_window_system:7.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2437
reference_id CVE-2007-2437
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2437
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29939.txt
reference_id CVE-2007-2437;OSVDB-34905
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29939.txt
20
reference_url https://www.securityfocus.com/bid/23741/info
reference_id CVE-2007-2437;OSVDB-34905
reference_type exploit
scores
url https://www.securityfocus.com/bid/23741/info
21
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.3.0.0.dfsg-4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.3.0.0.dfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.3.0.0.dfsg-4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-2437
risk_score 10.0
exploitability 2.0
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2u2q-xxe5-q7e9
7
url VCID-2vrb-n6cc-c7bc
vulnerability_id VCID-2vrb-n6cc-c7bc
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49178
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21634
published_at 2026-04-07T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21881
published_at 2026-04-04T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-08T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21768
published_at 2026-04-09T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.2178
published_at 2026-04-11T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-12T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22897
published_at 2026-04-02T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.40618
published_at 2026-05-05T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.40691
published_at 2026-05-07T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.4071
published_at 2026-05-09T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.4076
published_at 2026-04-29T12:55:00Z
11
value 0.00191
scoring_system epss
scoring_elements 0.4095
published_at 2026-04-21T12:55:00Z
12
value 0.00191
scoring_system epss
scoring_elements 0.40857
published_at 2026-04-24T12:55:00Z
13
value 0.00191
scoring_system epss
scoring_elements 0.40844
published_at 2026-04-26T12:55:00Z
14
value 0.00191
scoring_system epss
scoring_elements 0.41013
published_at 2026-04-13T12:55:00Z
15
value 0.00191
scoring_system epss
scoring_elements 0.41056
published_at 2026-04-16T12:55:00Z
16
value 0.00191
scoring_system epss
scoring_elements 0.41027
published_at 2026-04-18T12:55:00Z
17
value 0.00229
scoring_system epss
scoring_elements 0.45545
published_at 2026-05-11T12:55:00Z
18
value 0.00229
scoring_system epss
scoring_elements 0.45571
published_at 2026-05-12T12:55:00Z
19
value 0.00229
scoring_system epss
scoring_elements 0.45642
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369977
reference_id 2369977
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369977
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://access.redhat.com/security/cve/CVE-2025-49178
reference_id CVE-2025-49178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/security/cve/CVE-2025-49178
30
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
reference_id d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://www.x.org/wiki/Development/Security/
60
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
61
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-49178
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vrb-n6cc-c7bc
8
url VCID-36vg-vekq-vbhj
vulnerability_id VCID-36vg-vekq-vbhj
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12183
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75383
published_at 2026-05-14T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75236
published_at 2026-04-16T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75242
published_at 2026-04-18T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75233
published_at 2026-04-21T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-24T12:55:00Z
5
value 0.00871
scoring_system epss
scoring_elements 0.75273
published_at 2026-04-26T12:55:00Z
6
value 0.00871
scoring_system epss
scoring_elements 0.75277
published_at 2026-04-29T12:55:00Z
7
value 0.00871
scoring_system epss
scoring_elements 0.75286
published_at 2026-05-05T12:55:00Z
8
value 0.00871
scoring_system epss
scoring_elements 0.75313
published_at 2026-05-07T12:55:00Z
9
value 0.00871
scoring_system epss
scoring_elements 0.75338
published_at 2026-05-09T12:55:00Z
10
value 0.00871
scoring_system epss
scoring_elements 0.75319
published_at 2026-05-11T12:55:00Z
11
value 0.00871
scoring_system epss
scoring_elements 0.75327
published_at 2026-05-12T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
14
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
15
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
16
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
17
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
18
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
19
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509224
reference_id 1509224
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509224
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12183
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36vg-vekq-vbhj
9
url VCID-37e1-pzxj-2fdt
vulnerability_id VCID-37e1-pzxj-2fdt
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26598
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06135
published_at 2026-04-18T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06177
published_at 2026-04-11T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06173
published_at 2026-04-12T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06165
published_at 2026-04-13T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-16T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-07T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06148
published_at 2026-04-08T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06185
published_at 2026-04-09T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08785
published_at 2026-05-05T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08866
published_at 2026-04-29T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.09005
published_at 2026-05-09T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08934
published_at 2026-05-07T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09209
published_at 2026-04-24T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09164
published_at 2026-04-21T12:55:00Z
14
value 0.00032
scoring_system epss
scoring_elements 0.09153
published_at 2026-04-26T12:55:00Z
15
value 0.00037
scoring_system epss
scoring_elements 0.11138
published_at 2026-05-14T12:55:00Z
16
value 0.00037
scoring_system epss
scoring_elements 0.11043
published_at 2026-05-11T12:55:00Z
17
value 0.00037
scoring_system epss
scoring_elements 0.11087
published_at 2026-05-12T12:55:00Z
18
value 0.00066
scoring_system epss
scoring_elements 0.20468
published_at 2026-04-02T12:55:00Z
19
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345254
reference_id 2345254
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345254
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26598
reference_id CVE-2025-26598
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/security/cve/CVE-2025-26598
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26598
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37e1-pzxj-2fdt
10
url VCID-3aj3-ufnq-13f3
vulnerability_id VCID-3aj3-ufnq-13f3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12184
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74935
published_at 2026-05-14T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74864
published_at 2026-05-11T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74883
published_at 2026-05-12T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
14
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
15
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
16
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
17
value 0.00843
scoring_system epss
scoring_elements 0.74838
published_at 2026-05-05T12:55:00Z
18
value 0.00843
scoring_system epss
scoring_elements 0.74867
published_at 2026-05-07T12:55:00Z
19
value 0.00843
scoring_system epss
scoring_elements 0.74892
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509225
reference_id 1509225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509225
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aj3-ufnq-13f3
11
url VCID-3q8e-92u3-sufy
vulnerability_id VCID-3q8e-92u3-sufy
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12179
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74935
published_at 2026-05-14T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74864
published_at 2026-05-11T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74883
published_at 2026-05-12T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
14
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
15
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
16
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
17
value 0.00843
scoring_system epss
scoring_elements 0.74838
published_at 2026-05-05T12:55:00Z
18
value 0.00843
scoring_system epss
scoring_elements 0.74867
published_at 2026-05-07T12:55:00Z
19
value 0.00843
scoring_system epss
scoring_elements 0.74892
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509220
reference_id 1509220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509220
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12179
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3q8e-92u3-sufy
12
url VCID-41cd-s77z-6bcc
vulnerability_id VCID-41cd-s77z-6bcc
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26596
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0809
published_at 2026-05-05T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08293
published_at 2026-05-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08223
published_at 2026-05-07T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
15
value 0.00034
scoring_system epss
scoring_elements 0.10297
published_at 2026-05-14T12:55:00Z
16
value 0.00034
scoring_system epss
scoring_elements 0.102
published_at 2026-05-11T12:55:00Z
17
value 0.00034
scoring_system epss
scoring_elements 0.10239
published_at 2026-05-12T12:55:00Z
18
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
19
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345256
reference_id 2345256
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345256
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26596
reference_id CVE-2025-26596
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/security/cve/CVE-2025-26596
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26596
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41cd-s77z-6bcc
13
url VCID-42nu-8tap-5fbj
vulnerability_id VCID-42nu-8tap-5fbj
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8095.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8095
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.7837
published_at 2026-05-14T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-01T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78137
published_at 2026-04-02T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78166
published_at 2026-04-04T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78149
published_at 2026-04-07T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78175
published_at 2026-04-08T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-09T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78207
published_at 2026-04-11T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78189
published_at 2026-04-12T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-13T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78218
published_at 2026-04-16T12:55:00Z
11
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-18T12:55:00Z
12
value 0.01115
scoring_system epss
scoring_elements 0.78211
published_at 2026-04-21T12:55:00Z
13
value 0.01115
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-24T12:55:00Z
14
value 0.01115
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-26T12:55:00Z
15
value 0.01115
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-29T12:55:00Z
16
value 0.01115
scoring_system epss
scoring_elements 0.78276
published_at 2026-05-05T12:55:00Z
17
value 0.01115
scoring_system epss
scoring_elements 0.78302
published_at 2026-05-07T12:55:00Z
18
value 0.01115
scoring_system epss
scoring_elements 0.78319
published_at 2026-05-09T12:55:00Z
19
value 0.01115
scoring_system epss
scoring_elements 0.78314
published_at 2026-05-11T12:55:00Z
20
value 0.01115
scoring_system epss
scoring_elements 0.78331
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8095
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71599
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71599
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168694
reference_id 1168694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168694
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8095
reference_id CVE-2014-8095
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8095
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8095
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42nu-8tap-5fbj
14
url VCID-44yr-b94s-nfd5
vulnerability_id VCID-44yr-b94s-nfd5
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
reference_id
reference_type
scores
0
value 0.00954
scoring_system epss
scoring_elements 0.76586
published_at 2026-05-14T12:55:00Z
1
value 0.0113
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-09T12:55:00Z
2
value 0.0113
scoring_system epss
scoring_elements 0.78293
published_at 2026-04-04T12:55:00Z
3
value 0.0113
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-07T12:55:00Z
4
value 0.0113
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-02T12:55:00Z
5
value 0.0113
scoring_system epss
scoring_elements 0.78301
published_at 2026-04-08T12:55:00Z
6
value 0.0113
scoring_system epss
scoring_elements 0.78333
published_at 2026-04-11T12:55:00Z
7
value 0.0113
scoring_system epss
scoring_elements 0.78316
published_at 2026-04-12T12:55:00Z
8
value 0.0113
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-13T12:55:00Z
9
value 0.01132
scoring_system epss
scoring_elements 0.78433
published_at 2026-05-05T12:55:00Z
10
value 0.01132
scoring_system epss
scoring_elements 0.78458
published_at 2026-05-07T12:55:00Z
11
value 0.01132
scoring_system epss
scoring_elements 0.78474
published_at 2026-05-09T12:55:00Z
12
value 0.01132
scoring_system epss
scoring_elements 0.7847
published_at 2026-05-11T12:55:00Z
13
value 0.01132
scoring_system epss
scoring_elements 0.78486
published_at 2026-05-12T12:55:00Z
14
value 0.01202
scoring_system epss
scoring_elements 0.78951
published_at 2026-04-21T12:55:00Z
15
value 0.01202
scoring_system epss
scoring_elements 0.78955
published_at 2026-04-16T12:55:00Z
16
value 0.01202
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-18T12:55:00Z
17
value 0.01202
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-24T12:55:00Z
18
value 0.01202
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-26T12:55:00Z
19
value 0.01202
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
reference_id 2151755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-46340
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5
15
url VCID-49m7-vqbk-s3ce
vulnerability_id VCID-49m7-vqbk-s3ce
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14345
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29563
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.2963
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.2968
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29501
published_at 2026-04-07T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29601
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29603
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29558
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29505
published_at 2026-04-13T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29524
published_at 2026-04-16T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29497
published_at 2026-04-18T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29451
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29338
published_at 2026-04-24T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29224
published_at 2026-04-26T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29159
published_at 2026-04-29T12:55:00Z
14
value 0.00111
scoring_system epss
scoring_elements 0.29015
published_at 2026-05-05T12:55:00Z
15
value 0.00111
scoring_system epss
scoring_elements 0.29075
published_at 2026-05-07T12:55:00Z
16
value 0.00111
scoring_system epss
scoring_elements 0.2909
published_at 2026-05-09T12:55:00Z
17
value 0.00111
scoring_system epss
scoring_elements 0.29013
published_at 2026-05-11T12:55:00Z
18
value 0.00111
scoring_system epss
scoring_elements 0.29034
published_at 2026-05-12T12:55:00Z
19
value 0.00111
scoring_system epss
scoring_elements 0.29114
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862241
reference_id 1862241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862241
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
14
reference_url https://usn.ubuntu.com/4490-1/
reference_id USN-4490-1
reference_type
scores
url https://usn.ubuntu.com/4490-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2020-14345
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49m7-vqbk-s3ce
16
url VCID-4en9-s3k2-eydr
vulnerability_id VCID-4en9-s3k2-eydr
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1940.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1940.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1940
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23253
published_at 2026-05-14T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23314
published_at 2026-04-01T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23487
published_at 2026-04-02T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23523
published_at 2026-04-04T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23307
published_at 2026-04-07T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23379
published_at 2026-04-08T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.2343
published_at 2026-04-09T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.2345
published_at 2026-04-11T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23412
published_at 2026-04-12T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23357
published_at 2026-04-13T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23375
published_at 2026-04-16T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.2337
published_at 2026-04-18T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.2335
published_at 2026-04-21T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.23159
published_at 2026-04-24T12:55:00Z
14
value 0.00079
scoring_system epss
scoring_elements 0.23152
published_at 2026-04-26T12:55:00Z
15
value 0.00079
scoring_system epss
scoring_elements 0.23144
published_at 2026-04-29T12:55:00Z
16
value 0.00079
scoring_system epss
scoring_elements 0.23038
published_at 2026-05-05T12:55:00Z
17
value 0.00079
scoring_system epss
scoring_elements 0.23121
published_at 2026-05-07T12:55:00Z
18
value 0.00079
scoring_system epss
scoring_elements 0.23195
published_at 2026-05-09T12:55:00Z
19
value 0.00079
scoring_system epss
scoring_elements 0.23157
published_at 2026-05-11T12:55:00Z
20
value 0.00079
scoring_system epss
scoring_elements 0.23174
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1940
5
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=63353
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=63353
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
7
reference_url http://www.debian.org/security/2013/dsa-2661
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2661
8
reference_url http://www.openwall.com/lists/oss-security/2013/04/18/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/18/3
9
reference_url http://www.ubuntu.com/usn/USN-1803-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1803-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=950438
reference_id 950438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=950438
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1940
reference_id CVE-2013-1940
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1940
18
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
19
reference_url https://access.redhat.com/errata/RHSA-2013:1620
reference_id RHSA-2013:1620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1620
20
reference_url https://usn.ubuntu.com/1803-1/
reference_id USN-1803-1
reference_type
scores
url https://usn.ubuntu.com/1803-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.4-6?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.12.4-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.4-6%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2013-1940
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4en9-s3k2-eydr
17
url VCID-4ngr-6ccu-r7fv
vulnerability_id VCID-4ngr-6ccu-r7fv
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26106
published_at 2026-05-14T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-24T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.2612
published_at 2026-04-26T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-29T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.2596
published_at 2026-05-05T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26024
published_at 2026-05-07T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.2608
published_at 2026-05-09T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26009
published_at 2026-05-11T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26026
published_at 2026-05-12T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27952
published_at 2026-04-12T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27893
published_at 2026-04-13T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27902
published_at 2026-04-16T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27841
published_at 2026-04-21T12:55:00Z
13
value 0.00101
scoring_system epss
scoring_elements 0.27951
published_at 2026-04-08T12:55:00Z
14
value 0.00101
scoring_system epss
scoring_elements 0.27992
published_at 2026-04-09T12:55:00Z
15
value 0.00101
scoring_system epss
scoring_elements 0.27995
published_at 2026-04-11T12:55:00Z
16
value 0.00101
scoring_system epss
scoring_elements 0.28048
published_at 2026-04-02T12:55:00Z
17
value 0.00101
scoring_system epss
scoring_elements 0.28089
published_at 2026-04-04T12:55:00Z
18
value 0.00101
scoring_system epss
scoring_elements 0.27884
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
reference_id 2272000
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31083
reference_id CVE-2024-31083
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/security/cve/CVE-2024-31083
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-31083
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ngr-6ccu-r7fv
18
url VCID-4phf-c3vm-23db
vulnerability_id VCID-4phf-c3vm-23db
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8100.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8100
reference_id
reference_type
scores
0
value 0.01297
scoring_system epss
scoring_elements 0.79891
published_at 2026-05-14T12:55:00Z
1
value 0.01297
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-01T12:55:00Z
2
value 0.01297
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-02T12:55:00Z
3
value 0.01297
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-04T12:55:00Z
4
value 0.01297
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-07T12:55:00Z
5
value 0.01297
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-08T12:55:00Z
6
value 0.01297
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-09T12:55:00Z
7
value 0.01297
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-11T12:55:00Z
8
value 0.01297
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-12T12:55:00Z
9
value 0.01297
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-13T12:55:00Z
10
value 0.01297
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-16T12:55:00Z
11
value 0.01297
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-18T12:55:00Z
12
value 0.01297
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-21T12:55:00Z
13
value 0.01297
scoring_system epss
scoring_elements 0.79763
published_at 2026-04-24T12:55:00Z
14
value 0.01297
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-26T12:55:00Z
15
value 0.01297
scoring_system epss
scoring_elements 0.79785
published_at 2026-04-29T12:55:00Z
16
value 0.01297
scoring_system epss
scoring_elements 0.798
published_at 2026-05-05T12:55:00Z
17
value 0.01297
scoring_system epss
scoring_elements 0.79825
published_at 2026-05-07T12:55:00Z
18
value 0.01297
scoring_system epss
scoring_elements 0.79841
published_at 2026-05-09T12:55:00Z
19
value 0.01297
scoring_system epss
scoring_elements 0.79838
published_at 2026-05-11T12:55:00Z
20
value 0.01297
scoring_system epss
scoring_elements 0.79854
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8100
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71602
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71602
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168711
reference_id 1168711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168711
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8100
reference_id CVE-2014-8100
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8100
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8100
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4phf-c3vm-23db
19
url VCID-4ws1-kuah-rffq
vulnerability_id VCID-4ws1-kuah-rffq
summary
A format string vulnerability in X.Org X Server may allow local
    privilege escalation or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2118.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2118
reference_id
reference_type
scores
0
value 0.02146
scoring_system epss
scoring_elements 0.84157
published_at 2026-04-01T12:55:00Z
1
value 0.02146
scoring_system epss
scoring_elements 0.84171
published_at 2026-04-02T12:55:00Z
2
value 0.02146
scoring_system epss
scoring_elements 0.84189
published_at 2026-04-04T12:55:00Z
3
value 0.02146
scoring_system epss
scoring_elements 0.8419
published_at 2026-04-07T12:55:00Z
4
value 0.02146
scoring_system epss
scoring_elements 0.84212
published_at 2026-04-08T12:55:00Z
5
value 0.02146
scoring_system epss
scoring_elements 0.84218
published_at 2026-04-09T12:55:00Z
6
value 0.02146
scoring_system epss
scoring_elements 0.84236
published_at 2026-04-11T12:55:00Z
7
value 0.02146
scoring_system epss
scoring_elements 0.8423
published_at 2026-04-12T12:55:00Z
8
value 0.02146
scoring_system epss
scoring_elements 0.84226
published_at 2026-04-13T12:55:00Z
9
value 0.02146
scoring_system epss
scoring_elements 0.84248
published_at 2026-04-16T12:55:00Z
10
value 0.02146
scoring_system epss
scoring_elements 0.84249
published_at 2026-04-18T12:55:00Z
11
value 0.02146
scoring_system epss
scoring_elements 0.84254
published_at 2026-04-21T12:55:00Z
12
value 0.02146
scoring_system epss
scoring_elements 0.84279
published_at 2026-04-24T12:55:00Z
13
value 0.02146
scoring_system epss
scoring_elements 0.84288
published_at 2026-04-26T12:55:00Z
14
value 0.02146
scoring_system epss
scoring_elements 0.84293
published_at 2026-04-29T12:55:00Z
15
value 0.02146
scoring_system epss
scoring_elements 0.84312
published_at 2026-05-05T12:55:00Z
16
value 0.02146
scoring_system epss
scoring_elements 0.84337
published_at 2026-05-07T12:55:00Z
17
value 0.02146
scoring_system epss
scoring_elements 0.84354
published_at 2026-05-09T12:55:00Z
18
value 0.02146
scoring_system epss
scoring_elements 0.84353
published_at 2026-05-11T12:55:00Z
19
value 0.02146
scoring_system epss
scoring_elements 0.8437
published_at 2026-05-12T12:55:00Z
20
value 0.02146
scoring_system epss
scoring_elements 0.84401
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2118
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2118
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673148
reference_id 673148
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673148
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814126
reference_id 814126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=814126
5
reference_url https://security.gentoo.org/glsa/201207-04
reference_id GLSA-201207-04
reference_type
scores
url https://security.gentoo.org/glsa/201207-04
6
reference_url https://usn.ubuntu.com/1502-1/
reference_id USN-1502-1
reference_type
scores
url https://usn.ubuntu.com/1502-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.12.1.902-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.12.1.902-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.12.1.902-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2012-2118
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ws1-kuah-rffq
20
url VCID-515f-a8yj-4fej
vulnerability_id VCID-515f-a8yj-4fej
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26600
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0809
published_at 2026-05-05T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08293
published_at 2026-05-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08223
published_at 2026-05-07T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
15
value 0.00034
scoring_system epss
scoring_elements 0.10297
published_at 2026-05-14T12:55:00Z
16
value 0.00034
scoring_system epss
scoring_elements 0.102
published_at 2026-05-11T12:55:00Z
17
value 0.00034
scoring_system epss
scoring_elements 0.10239
published_at 2026-05-12T12:55:00Z
18
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
19
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345252
reference_id 2345252
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345252
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26600
reference_id CVE-2025-26600
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/security/cve/CVE-2025-26600
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26600
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-515f-a8yj-4fej
21
url VCID-537j-hg6y-jbgb
vulnerability_id VCID-537j-hg6y-jbgb
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8102.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8102
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.7837
published_at 2026-05-14T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-01T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78137
published_at 2026-04-02T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78166
published_at 2026-04-04T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78149
published_at 2026-04-07T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78175
published_at 2026-04-08T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-09T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78207
published_at 2026-04-11T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78189
published_at 2026-04-12T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-13T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78218
published_at 2026-04-16T12:55:00Z
11
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-18T12:55:00Z
12
value 0.01115
scoring_system epss
scoring_elements 0.78211
published_at 2026-04-21T12:55:00Z
13
value 0.01115
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-24T12:55:00Z
14
value 0.01115
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-26T12:55:00Z
15
value 0.01115
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-29T12:55:00Z
16
value 0.01115
scoring_system epss
scoring_elements 0.78276
published_at 2026-05-05T12:55:00Z
17
value 0.01115
scoring_system epss
scoring_elements 0.78302
published_at 2026-05-07T12:55:00Z
18
value 0.01115
scoring_system epss
scoring_elements 0.78319
published_at 2026-05-09T12:55:00Z
19
value 0.01115
scoring_system epss
scoring_elements 0.78314
published_at 2026-05-11T12:55:00Z
20
value 0.01115
scoring_system epss
scoring_elements 0.78331
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8102
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71608
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71608
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168714
reference_id 1168714
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168714
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8102
reference_id CVE-2014-8102
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8102
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8102
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-537j-hg6y-jbgb
22
url VCID-552y-dzaq-4fg9
vulnerability_id VCID-552y-dzaq-4fg9
summary X.org: multiple GLX input sanitization flaws
references
0
reference_url http://cgit.freedesktop.org/xorg/xserver/commit?id=3f0d3f4d97bce75c1828635c322b6560a45a037f
reference_id
reference_type
scores
url http://cgit.freedesktop.org/xorg/xserver/commit?id=3f0d3f4d97bce75c1828635c322b6560a45a037f
1
reference_url http://cgit.freedesktop.org/xorg/xserver/commit?id=6c69235a9dfc52e4b4e47630ff4bab1a820eb543
reference_id
reference_type
scores
url http://cgit.freedesktop.org/xorg/xserver/commit?id=6c69235a9dfc52e4b4e47630ff4bab1a820eb543
2
reference_url http://cgit.freedesktop.org/xorg/xserver/commit?id=ec9c97c6bf70b523bc500bd3adf62176f1bb33a4
reference_id
reference_type
scores
url http://cgit.freedesktop.org/xorg/xserver/commit?id=ec9c97c6bf70b523bc500bd3adf62176f1bb33a4
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-1359.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-1359.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2011-1360.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-1360.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4818.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4818.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4818
reference_id
reference_type
scores
0
value 0.02846
scoring_system epss
scoring_elements 0.8637
published_at 2026-05-14T12:55:00Z
1
value 0.02846
scoring_system epss
scoring_elements 0.86156
published_at 2026-04-01T12:55:00Z
2
value 0.02846
scoring_system epss
scoring_elements 0.86166
published_at 2026-04-02T12:55:00Z
3
value 0.02846
scoring_system epss
scoring_elements 0.86181
published_at 2026-04-07T12:55:00Z
4
value 0.02846
scoring_system epss
scoring_elements 0.862
published_at 2026-04-08T12:55:00Z
5
value 0.02846
scoring_system epss
scoring_elements 0.86211
published_at 2026-04-09T12:55:00Z
6
value 0.02846
scoring_system epss
scoring_elements 0.86226
published_at 2026-04-11T12:55:00Z
7
value 0.02846
scoring_system epss
scoring_elements 0.86223
published_at 2026-04-12T12:55:00Z
8
value 0.02846
scoring_system epss
scoring_elements 0.86219
published_at 2026-04-13T12:55:00Z
9
value 0.02846
scoring_system epss
scoring_elements 0.86236
published_at 2026-04-16T12:55:00Z
10
value 0.02846
scoring_system epss
scoring_elements 0.86242
published_at 2026-04-18T12:55:00Z
11
value 0.02846
scoring_system epss
scoring_elements 0.86233
published_at 2026-04-21T12:55:00Z
12
value 0.02846
scoring_system epss
scoring_elements 0.86255
published_at 2026-04-24T12:55:00Z
13
value 0.02846
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-29T12:55:00Z
14
value 0.02846
scoring_system epss
scoring_elements 0.86283
published_at 2026-05-05T12:55:00Z
15
value 0.02846
scoring_system epss
scoring_elements 0.86304
published_at 2026-05-07T12:55:00Z
16
value 0.02846
scoring_system epss
scoring_elements 0.86324
published_at 2026-05-09T12:55:00Z
17
value 0.02846
scoring_system epss
scoring_elements 0.8632
published_at 2026-05-11T12:55:00Z
18
value 0.02846
scoring_system epss
scoring_elements 0.86333
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4818
7
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=28823
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=28823
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818
9
reference_url http://www.openwall.com/lists/oss-security/2011/09/22/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/09/22/7
10
reference_url http://www.openwall.com/lists/oss-security/2011/09/23/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/09/23/4
11
reference_url http://www.openwall.com/lists/oss-security/2011/09/23/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/09/23/6
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=740954
reference_id 740954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=740954
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:1.7.7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4818
reference_id CVE-2010-4818
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4818
15
reference_url https://access.redhat.com/errata/RHSA-2011:1359
reference_id RHSA-2011:1359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1359
16
reference_url https://access.redhat.com/errata/RHSA-2011:1360
reference_id RHSA-2011:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1360
17
reference_url https://usn.ubuntu.com/1232-1/
reference_id USN-1232-1
reference_type
scores
url https://usn.ubuntu.com/1232-1/
18
reference_url https://usn.ubuntu.com/1232-3/
reference_id USN-1232-3
reference_type
scores
url https://usn.ubuntu.com/1232-3/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.9.99.902-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.9.99.902-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.9.99.902-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2010-4818
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-552y-dzaq-4fg9
23
url VCID-5awx-j7z7-qyak
vulnerability_id VCID-5awx-j7z7-qyak
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0408
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04399
published_at 2026-05-14T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04147
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04271
published_at 2026-04-21T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04284
published_at 2026-04-24T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04304
published_at 2026-04-26T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04337
published_at 2026-04-29T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04324
published_at 2026-05-05T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04349
published_at 2026-05-07T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04386
published_at 2026-05-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04388
published_at 2026-05-11T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04392
published_at 2026-05-12T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.04831
published_at 2026-04-02T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.04874
published_at 2026-04-07T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.04857
published_at 2026-04-04T12:55:00Z
14
value 0.00024
scoring_system epss
scoring_elements 0.06473
published_at 2026-04-13T12:55:00Z
15
value 0.00024
scoring_system epss
scoring_elements 0.06491
published_at 2026-04-11T12:55:00Z
16
value 0.00024
scoring_system epss
scoring_elements 0.06484
published_at 2026-04-12T12:55:00Z
17
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-16T12:55:00Z
18
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-08T12:55:00Z
19
value 0.00024
scoring_system epss
scoring_elements 0.06496
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257689
reference_id 2257689
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257689
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0408
reference_id CVE-2024-0408
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/security/cve/CVE-2024-0408
23
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
24
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:0320
25
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2169
26
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2170
27
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2995
28
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2996
29
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
30
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
31
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-0408
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5awx-j7z7-qyak
24
url VCID-5gza-pvdd-zycf
vulnerability_id VCID-5gza-pvdd-zycf
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0255.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0255
reference_id
reference_type
scores
0
value 0.06422
scoring_system epss
scoring_elements 0.91004
published_at 2026-04-01T12:55:00Z
1
value 0.06422
scoring_system epss
scoring_elements 0.91009
published_at 2026-04-02T12:55:00Z
2
value 0.06422
scoring_system epss
scoring_elements 0.91018
published_at 2026-04-04T12:55:00Z
3
value 0.06422
scoring_system epss
scoring_elements 0.91028
published_at 2026-04-07T12:55:00Z
4
value 0.06422
scoring_system epss
scoring_elements 0.91041
published_at 2026-04-08T12:55:00Z
5
value 0.06422
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-09T12:55:00Z
6
value 0.06422
scoring_system epss
scoring_elements 0.91056
published_at 2026-04-12T12:55:00Z
7
value 0.06422
scoring_system epss
scoring_elements 0.91055
published_at 2026-04-13T12:55:00Z
8
value 0.06422
scoring_system epss
scoring_elements 0.91079
published_at 2026-04-18T12:55:00Z
9
value 0.06422
scoring_system epss
scoring_elements 0.91081
published_at 2026-04-21T12:55:00Z
10
value 0.06422
scoring_system epss
scoring_elements 0.91094
published_at 2026-04-24T12:55:00Z
11
value 0.06422
scoring_system epss
scoring_elements 0.91092
published_at 2026-04-26T12:55:00Z
12
value 0.06422
scoring_system epss
scoring_elements 0.91087
published_at 2026-04-29T12:55:00Z
13
value 0.06422
scoring_system epss
scoring_elements 0.91102
published_at 2026-05-05T12:55:00Z
14
value 0.06422
scoring_system epss
scoring_elements 0.91116
published_at 2026-05-07T12:55:00Z
15
value 0.06422
scoring_system epss
scoring_elements 0.91129
published_at 2026-05-09T12:55:00Z
16
value 0.06422
scoring_system epss
scoring_elements 0.91127
published_at 2026-05-11T12:55:00Z
17
value 0.06422
scoring_system epss
scoring_elements 0.91136
published_at 2026-05-12T12:55:00Z
18
value 0.06422
scoring_system epss
scoring_elements 0.91146
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0255
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1189062
reference_id 1189062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1189062
4
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
5
reference_url https://access.redhat.com/errata/RHSA-2015:0797
reference_id RHSA-2015:0797
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0797
6
reference_url https://usn.ubuntu.com/2500-1/
reference_id USN-2500-1
reference_type
scores
url https://usn.ubuntu.com/2500-1/
7
reference_url https://usn.ubuntu.com/USN-4772-1/
reference_id USN-USN-4772-1
reference_type
scores
url https://usn.ubuntu.com/USN-4772-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2015-0255
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5gza-pvdd-zycf
25
url VCID-5hm3-stns-77a4
vulnerability_id VCID-5hm3-stns-77a4
summary gnome-screensaver loses keyboard grab when running under compiz
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3920.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3920
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15944
published_at 2026-05-12T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16008
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16071
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15868
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15953
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16016
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15994
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15956
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15888
published_at 2026-04-24T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15813
published_at 2026-04-16T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15826
published_at 2026-04-18T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15872
published_at 2026-04-21T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15883
published_at 2026-04-26T12:55:00Z
13
value 0.00051
scoring_system epss
scoring_elements 0.15849
published_at 2026-04-29T12:55:00Z
14
value 0.00051
scoring_system epss
scoring_elements 0.15723
published_at 2026-05-05T12:55:00Z
15
value 0.00051
scoring_system epss
scoring_elements 0.15834
published_at 2026-05-07T12:55:00Z
16
value 0.00051
scoring_system epss
scoring_elements 0.15935
published_at 2026-05-09T12:55:00Z
17
value 0.00051
scoring_system epss
scoring_elements 0.1591
published_at 2026-05-11T12:55:00Z
18
value 0.00051
scoring_system epss
scoring_elements 0.16017
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3920
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3920
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=350271
reference_id 350271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=350271
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449108
reference_id 449108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449108
5
reference_url https://access.redhat.com/errata/RHSA-2008:0485
reference_id RHSA-2008:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0485
6
reference_url https://usn.ubuntu.com/537-1/
reference_id USN-537-1
reference_type
scores
url https://usn.ubuntu.com/537-1/
7
reference_url https://usn.ubuntu.com/537-2/
reference_id USN-537-2
reference_type
scores
url https://usn.ubuntu.com/537-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080118-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080118-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080118-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-3920
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hm3-stns-77a4
26
url VCID-62fw-zp51-gyhw
vulnerability_id VCID-62fw-zp51-gyhw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10971
reference_id
reference_type
scores
0
value 0.02611
scoring_system epss
scoring_elements 0.85568
published_at 2026-04-01T12:55:00Z
1
value 0.02611
scoring_system epss
scoring_elements 0.8558
published_at 2026-04-02T12:55:00Z
2
value 0.02611
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-04T12:55:00Z
3
value 0.02611
scoring_system epss
scoring_elements 0.85603
published_at 2026-04-07T12:55:00Z
4
value 0.02611
scoring_system epss
scoring_elements 0.85623
published_at 2026-04-08T12:55:00Z
5
value 0.02611
scoring_system epss
scoring_elements 0.85634
published_at 2026-04-09T12:55:00Z
6
value 0.02611
scoring_system epss
scoring_elements 0.85649
published_at 2026-04-11T12:55:00Z
7
value 0.02611
scoring_system epss
scoring_elements 0.85646
published_at 2026-04-12T12:55:00Z
8
value 0.02611
scoring_system epss
scoring_elements 0.85642
published_at 2026-04-13T12:55:00Z
9
value 0.02611
scoring_system epss
scoring_elements 0.85664
published_at 2026-04-16T12:55:00Z
10
value 0.02611
scoring_system epss
scoring_elements 0.85687
published_at 2026-04-24T12:55:00Z
11
value 0.02611
scoring_system epss
scoring_elements 0.85698
published_at 2026-04-26T12:55:00Z
12
value 0.02611
scoring_system epss
scoring_elements 0.857
published_at 2026-04-29T12:55:00Z
13
value 0.02611
scoring_system epss
scoring_elements 0.85716
published_at 2026-05-05T12:55:00Z
14
value 0.02611
scoring_system epss
scoring_elements 0.85737
published_at 2026-05-07T12:55:00Z
15
value 0.02611
scoring_system epss
scoring_elements 0.8567
published_at 2026-04-18T12:55:00Z
16
value 0.02611
scoring_system epss
scoring_elements 0.85665
published_at 2026-04-21T12:55:00Z
17
value 0.02753
scoring_system epss
scoring_elements 0.86102
published_at 2026-05-11T12:55:00Z
18
value 0.02753
scoring_system epss
scoring_elements 0.86115
published_at 2026-05-12T12:55:00Z
19
value 0.02753
scoring_system epss
scoring_elements 0.86154
published_at 2026-05-14T12:55:00Z
20
value 0.02753
scoring_system epss
scoring_elements 0.86106
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10971
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473204
reference_id 1473204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
reference_id 867492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
6
reference_url https://security.archlinux.org/ASA-201708-11
reference_id ASA-201708-11
reference_type
scores
url https://security.archlinux.org/ASA-201708-11
7
reference_url https://security.archlinux.org/AVG-341
reference_id AVG-341
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-341
8
reference_url https://usn.ubuntu.com/3362-1/
reference_id USN-3362-1
reference_type
scores
url https://usn.ubuntu.com/3362-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.3-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.3-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-10971
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62fw-zp51-gyhw
27
url VCID-68k5-jp7v-mqd7
vulnerability_id VCID-68k5-jp7v-mqd7
summary
A debugging functionality in the X.Org X Server that is bound to a
    hotkey by default can be used by local attackers to circumvent screen
    locking utilities.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0064.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0064
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23819
published_at 2026-04-01T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23941
published_at 2026-04-02T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23982
published_at 2026-04-04T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.2377
published_at 2026-04-07T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-08T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23888
published_at 2026-04-09T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.23905
published_at 2026-04-11T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.2386
published_at 2026-04-12T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23804
published_at 2026-04-18T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23816
published_at 2026-04-16T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23782
published_at 2026-04-21T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23666
published_at 2026-04-24T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23655
published_at 2026-04-26T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.23621
published_at 2026-04-29T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23499
published_at 2026-05-05T12:55:00Z
15
value 0.00081
scoring_system epss
scoring_elements 0.2358
published_at 2026-05-07T12:55:00Z
16
value 0.00081
scoring_system epss
scoring_elements 0.23648
published_at 2026-05-09T12:55:00Z
17
value 0.00081
scoring_system epss
scoring_elements 0.23593
published_at 2026-05-11T12:55:00Z
18
value 0.00081
scoring_system epss
scoring_elements 0.23612
published_at 2026-05-12T12:55:00Z
19
value 0.00081
scoring_system epss
scoring_elements 0.23702
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0064
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0064
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656410
reference_id 656410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656410
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=783039
reference_id 783039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=783039
5
reference_url https://security.gentoo.org/glsa/201201-16
reference_id GLSA-201201-16
reference_type
scores
url https://security.gentoo.org/glsa/201201-16
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.11.3.901-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.11.3.901-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.11.3.901-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2012-0064
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68k5-jp7v-mqd7
28
url VCID-68t6-6w3n-jffa
vulnerability_id VCID-68t6-6w3n-jffa
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5380
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22528
published_at 2026-05-14T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22568
published_at 2026-04-21T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22413
published_at 2026-04-24T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22403
published_at 2026-04-26T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22401
published_at 2026-04-29T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22303
published_at 2026-05-05T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22388
published_at 2026-05-07T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22465
published_at 2026-05-09T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22434
published_at 2026-05-11T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.2245
published_at 2026-05-12T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-16T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.2396
published_at 2026-04-18T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.24111
published_at 2026-04-02T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.24149
published_at 2026-04-04T12:55:00Z
14
value 0.00082
scoring_system epss
scoring_elements 0.2393
published_at 2026-04-07T12:55:00Z
15
value 0.00082
scoring_system epss
scoring_elements 0.23996
published_at 2026-04-08T12:55:00Z
16
value 0.00082
scoring_system epss
scoring_elements 0.24043
published_at 2026-04-09T12:55:00Z
17
value 0.00082
scoring_system epss
scoring_elements 0.2406
published_at 2026-04-11T12:55:00Z
18
value 0.00082
scoring_system epss
scoring_elements 0.24018
published_at 2026-04-12T12:55:00Z
19
value 0.00082
scoring_system epss
scoring_elements 0.23961
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244736
reference_id 2244736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2244736
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7428
reference_id RHSA-2023:7428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7428
8
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
9
reference_url https://access.redhat.com/errata/RHSA-2024:2298
reference_id RHSA-2024:2298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2298
10
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
11
reference_url https://access.redhat.com/errata/RHSA-2024:3067
reference_id RHSA-2024:3067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3067
12
reference_url https://usn.ubuntu.com/6453-1/
reference_id USN-6453-1
reference_type
scores
url https://usn.ubuntu.com/6453-1/
13
reference_url https://usn.ubuntu.com/6453-2/
reference_id USN-6453-2
reference_type
scores
url https://usn.ubuntu.com/6453-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u8%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.9-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.9-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2023-5380
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68t6-6w3n-jffa
29
url VCID-6cns-hbja-1bab
vulnerability_id VCID-6cns-hbja-1bab
summary
X.org, libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm are vulnerable
    to local privilege escalations because of unchecked setuid() calls.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4447
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38864
published_at 2026-04-01T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38996
published_at 2026-04-02T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.39016
published_at 2026-04-04T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38947
published_at 2026-04-07T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.39
published_at 2026-04-08T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.39014
published_at 2026-04-09T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.39027
published_at 2026-04-11T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38991
published_at 2026-04-18T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.38964
published_at 2026-04-13T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.39011
published_at 2026-04-16T12:55:00Z
10
value 0.00175
scoring_system epss
scoring_elements 0.38917
published_at 2026-04-21T12:55:00Z
11
value 0.00175
scoring_system epss
scoring_elements 0.38752
published_at 2026-04-24T12:55:00Z
12
value 0.00175
scoring_system epss
scoring_elements 0.38729
published_at 2026-04-26T12:55:00Z
13
value 0.00175
scoring_system epss
scoring_elements 0.3864
published_at 2026-04-29T12:55:00Z
14
value 0.00175
scoring_system epss
scoring_elements 0.38519
published_at 2026-05-11T12:55:00Z
15
value 0.00175
scoring_system epss
scoring_elements 0.38593
published_at 2026-05-07T12:55:00Z
16
value 0.00175
scoring_system epss
scoring_elements 0.38606
published_at 2026-05-09T12:55:00Z
17
value 0.00175
scoring_system epss
scoring_elements 0.38544
published_at 2026-05-12T12:55:00Z
18
value 0.00175
scoring_system epss
scoring_elements 0.38618
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447
3
reference_url https://security.gentoo.org/glsa/200608-25
reference_id GLSA-200608-25
reference_type
scores
url https://security.gentoo.org/glsa/200608-25
4
reference_url https://security.gentoo.org/glsa/200704-22
reference_id GLSA-200704-22
reference_type
scores
url https://security.gentoo.org/glsa/200704-22
fixed_packages
0
url pkg:deb/debian/xorg-server@1:1.0.2-9?distro=trixie
purl pkg:deb/debian/xorg-server@1:1.0.2-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@1:1.0.2-9%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2006-4447
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cns-hbja-1bab
30
url VCID-6hwh-7tvr-sqgn
vulnerability_id VCID-6hwh-7tvr-sqgn
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26597
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0809
published_at 2026-05-05T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08293
published_at 2026-05-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08223
published_at 2026-05-07T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
15
value 0.00034
scoring_system epss
scoring_elements 0.10297
published_at 2026-05-14T12:55:00Z
16
value 0.00034
scoring_system epss
scoring_elements 0.102
published_at 2026-05-11T12:55:00Z
17
value 0.00034
scoring_system epss
scoring_elements 0.10239
published_at 2026-05-12T12:55:00Z
18
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
19
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345255
reference_id 2345255
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345255
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26597
reference_id CVE-2025-26597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/security/cve/CVE-2025-26597
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26597
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hwh-7tvr-sqgn
31
url VCID-6qsh-kaxk-zuf9
vulnerability_id VCID-6qsh-kaxk-zuf9
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4011
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12368
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12447
published_at 2026-05-14T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12355
published_at 2026-05-09T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12348
published_at 2026-05-11T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12374
published_at 2026-05-12T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12476
published_at 2026-04-02T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-04T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12324
published_at 2026-04-07T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12404
published_at 2026-04-08T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12455
published_at 2026-04-09T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.1246
published_at 2026-04-11T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12422
published_at 2026-04-12T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12381
published_at 2026-04-13T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12282
published_at 2026-04-18T12:55:00Z
14
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-21T12:55:00Z
15
value 0.00041
scoring_system epss
scoring_elements 0.12387
published_at 2026-04-24T12:55:00Z
16
value 0.00041
scoring_system epss
scoring_elements 0.12354
published_at 2026-04-26T12:55:00Z
17
value 0.00041
scoring_system epss
scoring_elements 0.12243
published_at 2026-04-29T12:55:00Z
18
value 0.00041
scoring_system epss
scoring_elements 0.12157
published_at 2026-05-05T12:55:00Z
19
value 0.00041
scoring_system epss
scoring_elements 0.12292
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026074
reference_id 2026074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026074
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2021-4011
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qsh-kaxk-zuf9
32
url VCID-6rcq-qxef-nuf7
vulnerability_id VCID-6rcq-qxef-nuf7
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52889
published_at 2026-05-14T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52842
published_at 2026-04-21T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5281
published_at 2026-04-24T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52821
published_at 2026-04-26T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52783
published_at 2026-04-29T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52728
published_at 2026-05-05T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52779
published_at 2026-05-07T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52822
published_at 2026-05-09T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52789
published_at 2026-05-11T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52815
published_at 2026-05-12T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
11
value 0.00321
scoring_system epss
scoring_elements 0.55161
published_at 2026-04-18T12:55:00Z
12
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
13
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
14
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
15
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
16
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
17
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
18
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
reference_id 2256690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-0229
reference_id CVE-2024-0229
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/security/cve/CVE-2024-0229
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-0229
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcq-qxef-nuf7
33
url VCID-7nax-5yw9-eye8
vulnerability_id VCID-7nax-5yw9-eye8
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26599
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0809
published_at 2026-05-05T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08293
published_at 2026-05-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08223
published_at 2026-05-07T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
15
value 0.00034
scoring_system epss
scoring_elements 0.10297
published_at 2026-05-14T12:55:00Z
16
value 0.00034
scoring_system epss
scoring_elements 0.102
published_at 2026-05-11T12:55:00Z
17
value 0.00034
scoring_system epss
scoring_elements 0.10239
published_at 2026-05-12T12:55:00Z
18
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
19
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345253
reference_id 2345253
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345253
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26599
reference_id CVE-2025-26599
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/security/cve/CVE-2025-26599
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26599
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nax-5yw9-eye8
34
url VCID-7r23-ad57-yydp
vulnerability_id VCID-7r23-ad57-yydp
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13721
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24792
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24624
published_at 2026-05-14T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24459
published_at 2026-05-05T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24535
published_at 2026-05-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.246
published_at 2026-05-09T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24526
published_at 2026-05-11T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24544
published_at 2026-05-12T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24868
published_at 2026-04-02T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24907
published_at 2026-04-04T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.2468
published_at 2026-04-07T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24749
published_at 2026-04-08T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24795
published_at 2026-04-09T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24808
published_at 2026-04-11T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24768
published_at 2026-04-12T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24711
published_at 2026-04-13T12:55:00Z
15
value 0.00086
scoring_system epss
scoring_elements 0.24727
published_at 2026-04-16T12:55:00Z
16
value 0.00086
scoring_system epss
scoring_elements 0.24719
published_at 2026-04-18T12:55:00Z
17
value 0.00086
scoring_system epss
scoring_elements 0.24696
published_at 2026-04-21T12:55:00Z
18
value 0.00086
scoring_system epss
scoring_elements 0.24636
published_at 2026-04-24T12:55:00Z
19
value 0.00086
scoring_system epss
scoring_elements 0.24625
published_at 2026-04-26T12:55:00Z
20
value 0.00086
scoring_system epss
scoring_elements 0.24582
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13721
2
reference_url https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
reference_id
reference_type
scores
url https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:C
1
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
reference_id
reference_type
scores
url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
19
reference_url http://www.debian.org/security/2017/dsa-4000
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-4000
20
reference_url http://www.openwall.com/lists/oss-security/2017/10/04/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/10/04/10
21
reference_url http://www.securityfocus.com/bid/101238
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101238
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500387
reference_id 1500387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500387
23
reference_url https://security.archlinux.org/ASA-201710-10
reference_id ASA-201710-10
reference_type
scores
url https://security.archlinux.org/ASA-201710-10
24
reference_url https://security.archlinux.org/AVG-432
reference_id AVG-432
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-432
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13721
reference_id CVE-2017-13721
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13721
29
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
30
reference_url https://usn.ubuntu.com/3453-1/
reference_id USN-3453-1
reference_type
scores
url https://usn.ubuntu.com/3453-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.4-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-13721
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7r23-ad57-yydp
35
url VCID-7t5d-r9wp-fqgn
vulnerability_id VCID-7t5d-r9wp-fqgn
summary
Multiple vulnerabilities have been discovered in the X.Org X server and
    Xfont library, allowing for a local privilege escalation and arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6429.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6429
reference_id
reference_type
scores
0
value 0.0227
scoring_system epss
scoring_elements 0.84567
published_at 2026-04-01T12:55:00Z
1
value 0.0227
scoring_system epss
scoring_elements 0.84581
published_at 2026-04-02T12:55:00Z
2
value 0.0227
scoring_system epss
scoring_elements 0.84602
published_at 2026-04-04T12:55:00Z
3
value 0.0227
scoring_system epss
scoring_elements 0.84604
published_at 2026-04-07T12:55:00Z
4
value 0.0227
scoring_system epss
scoring_elements 0.84625
published_at 2026-04-08T12:55:00Z
5
value 0.0227
scoring_system epss
scoring_elements 0.84633
published_at 2026-04-09T12:55:00Z
6
value 0.0227
scoring_system epss
scoring_elements 0.84651
published_at 2026-04-11T12:55:00Z
7
value 0.0227
scoring_system epss
scoring_elements 0.84647
published_at 2026-04-12T12:55:00Z
8
value 0.0227
scoring_system epss
scoring_elements 0.84642
published_at 2026-04-13T12:55:00Z
9
value 0.0227
scoring_system epss
scoring_elements 0.84663
published_at 2026-04-16T12:55:00Z
10
value 0.0227
scoring_system epss
scoring_elements 0.84664
published_at 2026-04-18T12:55:00Z
11
value 0.0227
scoring_system epss
scoring_elements 0.84665
published_at 2026-04-21T12:55:00Z
12
value 0.0227
scoring_system epss
scoring_elements 0.84692
published_at 2026-04-24T12:55:00Z
13
value 0.0227
scoring_system epss
scoring_elements 0.84702
published_at 2026-04-26T12:55:00Z
14
value 0.0227
scoring_system epss
scoring_elements 0.84703
published_at 2026-04-29T12:55:00Z
15
value 0.0227
scoring_system epss
scoring_elements 0.84717
published_at 2026-05-05T12:55:00Z
16
value 0.0227
scoring_system epss
scoring_elements 0.84743
published_at 2026-05-07T12:55:00Z
17
value 0.0227
scoring_system epss
scoring_elements 0.8476
published_at 2026-05-09T12:55:00Z
18
value 0.0227
scoring_system epss
scoring_elements 0.84756
published_at 2026-05-11T12:55:00Z
19
value 0.0227
scoring_system epss
scoring_elements 0.84772
published_at 2026-05-12T12:55:00Z
20
value 0.0227
scoring_system epss
scoring_elements 0.84804
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=413721
reference_id 413721
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=413721
4
reference_url https://security.gentoo.org/glsa/200801-09
reference_id GLSA-200801-09
reference_type
scores
url https://security.gentoo.org/glsa/200801-09
5
reference_url https://access.redhat.com/errata/RHSA-2008:0029
reference_id RHSA-2008:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0029
6
reference_url https://access.redhat.com/errata/RHSA-2008:0030
reference_id RHSA-2008:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0030
7
reference_url https://access.redhat.com/errata/RHSA-2008:0031
reference_id RHSA-2008:0031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0031
8
reference_url https://usn.ubuntu.com/571-1/
reference_id USN-571-1
reference_type
scores
url https://usn.ubuntu.com/571-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-6429
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7t5d-r9wp-fqgn
36
url VCID-8k9m-8p49-fyac
vulnerability_id VCID-8k9m-8p49-fyac
summary
Sean Larsson from iDefense Labs has found multiple vulnerabilities in the
    DBE and Render extensions.
references
0
reference_url http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
reference_id
reference_type
scores
url http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
2
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=463
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=463
3
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
4
reference_url http://osvdb.org/32084
reference_id
reference_type
scores
url http://osvdb.org/32084
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6101.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6101.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6101
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13812
published_at 2026-05-14T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.1371
published_at 2026-04-01T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13804
published_at 2026-04-02T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.1386
published_at 2026-04-04T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.1366
published_at 2026-04-07T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13743
published_at 2026-04-08T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13793
published_at 2026-04-09T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13762
published_at 2026-04-11T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13725
published_at 2026-04-12T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13675
published_at 2026-04-13T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13586
published_at 2026-04-16T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13583
published_at 2026-04-18T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-21T12:55:00Z
13
value 0.00045
scoring_system epss
scoring_elements 0.13666
published_at 2026-04-24T12:55:00Z
14
value 0.00045
scoring_system epss
scoring_elements 0.13637
published_at 2026-04-26T12:55:00Z
15
value 0.00045
scoring_system epss
scoring_elements 0.13538
published_at 2026-04-29T12:55:00Z
16
value 0.00045
scoring_system epss
scoring_elements 0.13447
published_at 2026-05-05T12:55:00Z
17
value 0.00045
scoring_system epss
scoring_elements 0.13603
published_at 2026-05-07T12:55:00Z
18
value 0.00045
scoring_system epss
scoring_elements 0.13687
published_at 2026-05-09T12:55:00Z
19
value 0.00045
scoring_system epss
scoring_elements 0.13682
published_at 2026-05-11T12:55:00Z
20
value 0.00045
scoring_system epss
scoring_elements 0.13716
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6101
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101
8
reference_url http://secunia.com/advisories/23633
reference_id
reference_type
scores
url http://secunia.com/advisories/23633
9
reference_url http://secunia.com/advisories/23670
reference_id
reference_type
scores
url http://secunia.com/advisories/23670
10
reference_url http://secunia.com/advisories/23684
reference_id
reference_type
scores
url http://secunia.com/advisories/23684
11
reference_url http://secunia.com/advisories/23689
reference_id
reference_type
scores
url http://secunia.com/advisories/23689
12
reference_url http://secunia.com/advisories/23698
reference_id
reference_type
scores
url http://secunia.com/advisories/23698
13
reference_url http://secunia.com/advisories/23705
reference_id
reference_type
scores
url http://secunia.com/advisories/23705
14
reference_url http://secunia.com/advisories/23758
reference_id
reference_type
scores
url http://secunia.com/advisories/23758
15
reference_url http://secunia.com/advisories/23789
reference_id
reference_type
scores
url http://secunia.com/advisories/23789
16
reference_url http://secunia.com/advisories/23966
reference_id
reference_type
scores
url http://secunia.com/advisories/23966
17
reference_url http://secunia.com/advisories/24168
reference_id
reference_type
scores
url http://secunia.com/advisories/24168
18
reference_url http://secunia.com/advisories/24210
reference_id
reference_type
scores
url http://secunia.com/advisories/24210
19
reference_url http://secunia.com/advisories/24247
reference_id
reference_type
scores
url http://secunia.com/advisories/24247
20
reference_url http://secunia.com/advisories/24401
reference_id
reference_type
scores
url http://secunia.com/advisories/24401
21
reference_url http://secunia.com/advisories/25802
reference_id
reference_type
scores
url http://secunia.com/advisories/25802
22
reference_url http://security.gentoo.org/glsa/glsa-200701-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-25.xml
23
reference_url http://securitytracker.com/id?1017495
reference_id
reference_type
scores
url http://securitytracker.com/id?1017495
24
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31337
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31337
25
reference_url https://issues.rpath.com/browse/RPL-920
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-920
26
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10490
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10490
28
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
29
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
30
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
31
reference_url https://www.debian.org/security/2007/dsa-1249
reference_id
reference_type
scores
url https://www.debian.org/security/2007/dsa-1249
32
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
33
reference_url http://www.novell.com/linux/security/advisories/2007_08_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_08_x.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2007-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0002.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2007-0003.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0003.html
36
reference_url http://www.securityfocus.com/bid/21968
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21968
37
reference_url http://www.ubuntu.com/usn/usn-403-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-403-1
38
reference_url http://www.vupen.com/english/advisories/2007/0108
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0108
39
reference_url http://www.vupen.com/english/advisories/2007/0109
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0109
40
reference_url http://www.vupen.com/english/advisories/2007/0589
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0589
41
reference_url http://www.vupen.com/english/advisories/2007/0669
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0669
42
reference_url http://www.vupen.com/english/advisories/2007/2233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2233
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618238
reference_id 1618238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618238
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6101
reference_id CVE-2006-6101
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2006-6101
50
reference_url https://security.gentoo.org/glsa/200701-25
reference_id GLSA-200701-25
reference_type
scores
url https://security.gentoo.org/glsa/200701-25
51
reference_url https://access.redhat.com/errata/RHSA-2007:0002
reference_id RHSA-2007:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0002
52
reference_url https://access.redhat.com/errata/RHSA-2007:0003
reference_id RHSA-2007:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0003
53
reference_url https://usn.ubuntu.com/403-1/
reference_id USN-403-1
reference_type
scores
url https://usn.ubuntu.com/403-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-15%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2006-6101
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k9m-8p49-fyac
37
url VCID-954x-c1x3-67gg
vulnerability_id VCID-954x-c1x3-67gg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10972
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.5716
published_at 2026-05-14T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.57072
published_at 2026-05-11T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57097
published_at 2026-05-12T12:55:00Z
3
value 0.0056
scoring_system epss
scoring_elements 0.68213
published_at 2026-04-02T12:55:00Z
4
value 0.0056
scoring_system epss
scoring_elements 0.68207
published_at 2026-04-07T12:55:00Z
5
value 0.0056
scoring_system epss
scoring_elements 0.68258
published_at 2026-04-08T12:55:00Z
6
value 0.0056
scoring_system epss
scoring_elements 0.68274
published_at 2026-04-09T12:55:00Z
7
value 0.0056
scoring_system epss
scoring_elements 0.68299
published_at 2026-04-11T12:55:00Z
8
value 0.0056
scoring_system epss
scoring_elements 0.68286
published_at 2026-04-12T12:55:00Z
9
value 0.0056
scoring_system epss
scoring_elements 0.68253
published_at 2026-04-13T12:55:00Z
10
value 0.0056
scoring_system epss
scoring_elements 0.68292
published_at 2026-04-16T12:55:00Z
11
value 0.0056
scoring_system epss
scoring_elements 0.68303
published_at 2026-04-18T12:55:00Z
12
value 0.0056
scoring_system epss
scoring_elements 0.68283
published_at 2026-04-21T12:55:00Z
13
value 0.0056
scoring_system epss
scoring_elements 0.68326
published_at 2026-04-24T12:55:00Z
14
value 0.0056
scoring_system epss
scoring_elements 0.68335
published_at 2026-04-26T12:55:00Z
15
value 0.0056
scoring_system epss
scoring_elements 0.6834
published_at 2026-04-29T12:55:00Z
16
value 0.0056
scoring_system epss
scoring_elements 0.68317
published_at 2026-05-05T12:55:00Z
17
value 0.0056
scoring_system epss
scoring_elements 0.6836
published_at 2026-05-07T12:55:00Z
18
value 0.0056
scoring_system epss
scoring_elements 0.68396
published_at 2026-05-09T12:55:00Z
19
value 0.0056
scoring_system epss
scoring_elements 0.68192
published_at 2026-04-01T12:55:00Z
20
value 0.0056
scoring_system epss
scoring_elements 0.68231
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10972
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473205
reference_id 1473205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473205
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
reference_id 867492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867492
6
reference_url https://security.archlinux.org/ASA-201708-11
reference_id ASA-201708-11
reference_type
scores
url https://security.archlinux.org/ASA-201708-11
7
reference_url https://security.archlinux.org/AVG-341
reference_id AVG-341
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-341
8
reference_url https://usn.ubuntu.com/3362-1/
reference_id USN-3362-1
reference_type
scores
url https://usn.ubuntu.com/3362-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.3-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.3-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-10972
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-954x-c1x3-67gg
38
url VCID-9cjy-6fj5-r7ag
vulnerability_id VCID-9cjy-6fj5-r7ag
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.30981
published_at 2026-05-14T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.30975
published_at 2026-05-09T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.30888
published_at 2026-05-11T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.30911
published_at 2026-05-12T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
14
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
15
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
16
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
17
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
18
value 0.00123
scoring_system epss
scoring_elements 0.30901
published_at 2026-05-05T12:55:00Z
19
value 0.00123
scoring_system epss
scoring_elements 0.3097
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
reference_id 2271998
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31081
reference_id CVE-2024-31081
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/security/cve/CVE-2024-31081
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-31081
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cjy-6fj5-r7ag
39
url VCID-9qnq-nhan-7ubj
vulnerability_id VCID-9qnq-nhan-7ubj
summary
Multiple vulnerabilities have been discovered in the X.Org X server and
    Xfont library, allowing for a local privilege escalation and arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0006.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0006
reference_id
reference_type
scores
0
value 0.29274
scoring_system epss
scoring_elements 0.96561
published_at 2026-04-01T12:55:00Z
1
value 0.29274
scoring_system epss
scoring_elements 0.9657
published_at 2026-04-02T12:55:00Z
2
value 0.29274
scoring_system epss
scoring_elements 0.96576
published_at 2026-04-04T12:55:00Z
3
value 0.29274
scoring_system epss
scoring_elements 0.96579
published_at 2026-04-07T12:55:00Z
4
value 0.29274
scoring_system epss
scoring_elements 0.96587
published_at 2026-04-08T12:55:00Z
5
value 0.29274
scoring_system epss
scoring_elements 0.96589
published_at 2026-04-09T12:55:00Z
6
value 0.29274
scoring_system epss
scoring_elements 0.96591
published_at 2026-04-11T12:55:00Z
7
value 0.29274
scoring_system epss
scoring_elements 0.96592
published_at 2026-04-12T12:55:00Z
8
value 0.29274
scoring_system epss
scoring_elements 0.96594
published_at 2026-04-13T12:55:00Z
9
value 0.29274
scoring_system epss
scoring_elements 0.96601
published_at 2026-04-16T12:55:00Z
10
value 0.29274
scoring_system epss
scoring_elements 0.96605
published_at 2026-04-18T12:55:00Z
11
value 0.29274
scoring_system epss
scoring_elements 0.96609
published_at 2026-04-21T12:55:00Z
12
value 0.29274
scoring_system epss
scoring_elements 0.9661
published_at 2026-04-24T12:55:00Z
13
value 0.29274
scoring_system epss
scoring_elements 0.96611
published_at 2026-04-26T12:55:00Z
14
value 0.29274
scoring_system epss
scoring_elements 0.96612
published_at 2026-04-29T12:55:00Z
15
value 0.29274
scoring_system epss
scoring_elements 0.96619
published_at 2026-05-05T12:55:00Z
16
value 0.29274
scoring_system epss
scoring_elements 0.96622
published_at 2026-05-07T12:55:00Z
17
value 0.29274
scoring_system epss
scoring_elements 0.96627
published_at 2026-05-09T12:55:00Z
18
value 0.29274
scoring_system epss
scoring_elements 0.9663
published_at 2026-05-11T12:55:00Z
19
value 0.29274
scoring_system epss
scoring_elements 0.96635
published_at 2026-05-12T12:55:00Z
20
value 0.29274
scoring_system epss
scoring_elements 0.96644
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=428044
reference_id 428044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=428044
4
reference_url https://security.gentoo.org/glsa/200801-09
reference_id GLSA-200801-09
reference_type
scores
url https://security.gentoo.org/glsa/200801-09
5
reference_url https://access.redhat.com/errata/RHSA-2008:0029
reference_id RHSA-2008:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0029
6
reference_url https://access.redhat.com/errata/RHSA-2008:0030
reference_id RHSA-2008:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0030
7
reference_url https://access.redhat.com/errata/RHSA-2008:0064
reference_id RHSA-2008:0064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0064
8
reference_url https://usn.ubuntu.com/571-1/
reference_id USN-571-1
reference_type
scores
url https://usn.ubuntu.com/571-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2008-0006
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qnq-nhan-7ubj
40
url VCID-9y4q-2tnh-jkcs
vulnerability_id VCID-9y4q-2tnh-jkcs
summary
Multiple vulnerabilities have been discovered in the X.Org X server,
    possibly allowing for the remote execution of arbitrary code with root
    privileges.
references
0
reference_url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff
reference_id
reference_type
scores
url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
2
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0502.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0502.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2008-0504.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0504.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2008-0512.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0512.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1379.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1379.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1379
reference_id
reference_type
scores
0
value 0.00996
scoring_system epss
scoring_elements 0.77125
published_at 2026-05-14T12:55:00Z
1
value 0.00996
scoring_system epss
scoring_elements 0.76877
published_at 2026-04-01T12:55:00Z
2
value 0.00996
scoring_system epss
scoring_elements 0.76884
published_at 2026-04-02T12:55:00Z
3
value 0.00996
scoring_system epss
scoring_elements 0.76915
published_at 2026-04-04T12:55:00Z
4
value 0.00996
scoring_system epss
scoring_elements 0.76897
published_at 2026-04-07T12:55:00Z
5
value 0.00996
scoring_system epss
scoring_elements 0.76928
published_at 2026-04-08T12:55:00Z
6
value 0.00996
scoring_system epss
scoring_elements 0.76939
published_at 2026-04-09T12:55:00Z
7
value 0.00996
scoring_system epss
scoring_elements 0.76966
published_at 2026-04-11T12:55:00Z
8
value 0.00996
scoring_system epss
scoring_elements 0.76946
published_at 2026-04-12T12:55:00Z
9
value 0.00996
scoring_system epss
scoring_elements 0.76941
published_at 2026-04-13T12:55:00Z
10
value 0.00996
scoring_system epss
scoring_elements 0.76982
published_at 2026-04-16T12:55:00Z
11
value 0.00996
scoring_system epss
scoring_elements 0.76985
published_at 2026-04-18T12:55:00Z
12
value 0.00996
scoring_system epss
scoring_elements 0.76978
published_at 2026-04-21T12:55:00Z
13
value 0.00996
scoring_system epss
scoring_elements 0.77012
published_at 2026-04-24T12:55:00Z
14
value 0.00996
scoring_system epss
scoring_elements 0.77018
published_at 2026-04-26T12:55:00Z
15
value 0.00996
scoring_system epss
scoring_elements 0.77031
published_at 2026-04-29T12:55:00Z
16
value 0.00996
scoring_system epss
scoring_elements 0.77022
published_at 2026-05-05T12:55:00Z
17
value 0.00996
scoring_system epss
scoring_elements 0.77052
published_at 2026-05-07T12:55:00Z
18
value 0.00996
scoring_system epss
scoring_elements 0.77072
published_at 2026-05-09T12:55:00Z
19
value 0.00996
scoring_system epss
scoring_elements 0.77059
published_at 2026-05-11T12:55:00Z
20
value 0.00996
scoring_system epss
scoring_elements 0.77075
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1379
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379
13
reference_url http://secunia.com/advisories/30627
reference_id
reference_type
scores
url http://secunia.com/advisories/30627
14
reference_url http://secunia.com/advisories/30628
reference_id
reference_type
scores
url http://secunia.com/advisories/30628
15
reference_url http://secunia.com/advisories/30629
reference_id
reference_type
scores
url http://secunia.com/advisories/30629
16
reference_url http://secunia.com/advisories/30630
reference_id
reference_type
scores
url http://secunia.com/advisories/30630
17
reference_url http://secunia.com/advisories/30637
reference_id
reference_type
scores
url http://secunia.com/advisories/30637
18
reference_url http://secunia.com/advisories/30659
reference_id
reference_type
scores
url http://secunia.com/advisories/30659
19
reference_url http://secunia.com/advisories/30664
reference_id
reference_type
scores
url http://secunia.com/advisories/30664
20
reference_url http://secunia.com/advisories/30666
reference_id
reference_type
scores
url http://secunia.com/advisories/30666
21
reference_url http://secunia.com/advisories/30671
reference_id
reference_type
scores
url http://secunia.com/advisories/30671
22
reference_url http://secunia.com/advisories/30715
reference_id
reference_type
scores
url http://secunia.com/advisories/30715
23
reference_url http://secunia.com/advisories/30772
reference_id
reference_type
scores
url http://secunia.com/advisories/30772
24
reference_url http://secunia.com/advisories/30809
reference_id
reference_type
scores
url http://secunia.com/advisories/30809
25
reference_url http://secunia.com/advisories/30843
reference_id
reference_type
scores
url http://secunia.com/advisories/30843
26
reference_url http://secunia.com/advisories/31025
reference_id
reference_type
scores
url http://secunia.com/advisories/31025
27
reference_url http://secunia.com/advisories/31109
reference_id
reference_type
scores
url http://secunia.com/advisories/31109
28
reference_url http://secunia.com/advisories/32099
reference_id
reference_type
scores
url http://secunia.com/advisories/32099
29
reference_url http://secunia.com/advisories/32545
reference_id
reference_type
scores
url http://secunia.com/advisories/32545
30
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
31
reference_url http://security.gentoo.org/glsa/glsa-200806-07.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-07.xml
32
reference_url http://securitytracker.com/id?1020246
reference_id
reference_type
scores
url http://securitytracker.com/id?1020246
33
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43016
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43016
34
reference_url https://issues.rpath.com/browse/RPL-2607
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2607
35
reference_url https://issues.rpath.com/browse/RPL-2619
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2619
36
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966
37
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
38
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
39
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
40
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
41
reference_url http://www.debian.org/security/2008/dsa-1595
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1595
42
reference_url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
43
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
44
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
45
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
46
reference_url http://www.redhat.com/support/errata/RHSA-2008-0503.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0503.html
47
reference_url http://www.securityfocus.com/archive/1/493548/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493548/100/0/threaded
48
reference_url http://www.securityfocus.com/archive/1/493550/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493550/100/0/threaded
49
reference_url http://www.securityfocus.com/bid/29669
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29669
50
reference_url http://www.ubuntu.com/usn/usn-616-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-616-1
51
reference_url http://www.vupen.com/english/advisories/2008/1803
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1803
52
reference_url http://www.vupen.com/english/advisories/2008/1833
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1833
53
reference_url http://www.vupen.com/english/advisories/2008/1983/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1983/references
54
reference_url http://www.vupen.com/english/advisories/2008/3000
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3000
55
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=445414
reference_id 445414
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=445414
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1379
reference_id CVE-2008-1379
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-1379
58
reference_url https://security.gentoo.org/glsa/200806-07
reference_id GLSA-200806-07
reference_type
scores
url https://security.gentoo.org/glsa/200806-07
59
reference_url https://access.redhat.com/errata/RHSA-2008:0502
reference_id RHSA-2008:0502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0502
60
reference_url https://access.redhat.com/errata/RHSA-2008:0503
reference_id RHSA-2008:0503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0503
61
reference_url https://access.redhat.com/errata/RHSA-2008:0504
reference_id RHSA-2008:0504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0504
62
reference_url https://access.redhat.com/errata/RHSA-2008:0512
reference_id RHSA-2008:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0512
63
reference_url https://usn.ubuntu.com/616-1/
reference_id USN-616-1
reference_type
scores
url https://usn.ubuntu.com/616-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2008-1379
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9y4q-2tnh-jkcs
41
url VCID-a4bk-m98g-93f8
vulnerability_id VCID-a4bk-m98g-93f8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
reference_id
reference_type
scores
0
value 0.00766
scoring_system epss
scoring_elements 0.73626
published_at 2026-05-14T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-13T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75742
published_at 2026-04-04T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-07T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-02T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
7
value 0.00908
scoring_system epss
scoring_elements 0.75772
published_at 2026-04-12T12:55:00Z
8
value 0.0091
scoring_system epss
scoring_elements 0.75906
published_at 2026-05-05T12:55:00Z
9
value 0.0091
scoring_system epss
scoring_elements 0.75935
published_at 2026-05-07T12:55:00Z
10
value 0.0091
scoring_system epss
scoring_elements 0.75959
published_at 2026-05-09T12:55:00Z
11
value 0.0091
scoring_system epss
scoring_elements 0.75943
published_at 2026-05-11T12:55:00Z
12
value 0.0091
scoring_system epss
scoring_elements 0.75957
published_at 2026-05-12T12:55:00Z
13
value 0.00966
scoring_system epss
scoring_elements 0.7661
published_at 2026-04-21T12:55:00Z
14
value 0.00966
scoring_system epss
scoring_elements 0.76618
published_at 2026-04-16T12:55:00Z
15
value 0.00966
scoring_system epss
scoring_elements 0.76622
published_at 2026-04-18T12:55:00Z
16
value 0.00966
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-24T12:55:00Z
17
value 0.00966
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-26T12:55:00Z
18
value 0.00966
scoring_system epss
scoring_elements 0.76661
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
reference_id 2151760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-46344
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8
42
url VCID-agtx-nbcj-jufj
vulnerability_id VCID-agtx-nbcj-jufj
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4396
reference_id
reference_type
scores
0
value 0.01971
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-01T12:55:00Z
1
value 0.01971
scoring_system epss
scoring_elements 0.83484
published_at 2026-04-02T12:55:00Z
2
value 0.01971
scoring_system epss
scoring_elements 0.83498
published_at 2026-04-07T12:55:00Z
3
value 0.01971
scoring_system epss
scoring_elements 0.83522
published_at 2026-04-08T12:55:00Z
4
value 0.01971
scoring_system epss
scoring_elements 0.83531
published_at 2026-04-09T12:55:00Z
5
value 0.01971
scoring_system epss
scoring_elements 0.83546
published_at 2026-04-11T12:55:00Z
6
value 0.01971
scoring_system epss
scoring_elements 0.8354
published_at 2026-04-12T12:55:00Z
7
value 0.01971
scoring_system epss
scoring_elements 0.83536
published_at 2026-04-13T12:55:00Z
8
value 0.01971
scoring_system epss
scoring_elements 0.8357
published_at 2026-04-16T12:55:00Z
9
value 0.01971
scoring_system epss
scoring_elements 0.83571
published_at 2026-04-18T12:55:00Z
10
value 0.01971
scoring_system epss
scoring_elements 0.83572
published_at 2026-04-21T12:55:00Z
11
value 0.01971
scoring_system epss
scoring_elements 0.83597
published_at 2026-04-24T12:55:00Z
12
value 0.01971
scoring_system epss
scoring_elements 0.83604
published_at 2026-04-26T12:55:00Z
13
value 0.01971
scoring_system epss
scoring_elements 0.83608
published_at 2026-04-29T12:55:00Z
14
value 0.01971
scoring_system epss
scoring_elements 0.83633
published_at 2026-05-05T12:55:00Z
15
value 0.01971
scoring_system epss
scoring_elements 0.83653
published_at 2026-05-07T12:55:00Z
16
value 0.01971
scoring_system epss
scoring_elements 0.83672
published_at 2026-05-11T12:55:00Z
17
value 0.01971
scoring_system epss
scoring_elements 0.83688
published_at 2026-05-12T12:55:00Z
18
value 0.01971
scoring_system epss
scoring_elements 0.83723
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1014561
reference_id 1014561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1014561
4
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
5
reference_url https://access.redhat.com/errata/RHSA-2013:1426
reference_id RHSA-2013:1426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1426
6
reference_url https://usn.ubuntu.com/1990-1/
reference_id USN-1990-1
reference_type
scores
url https://usn.ubuntu.com/1990-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.14.3-4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.14.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.14.3-4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2013-4396
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-agtx-nbcj-jufj
43
url VCID-atmg-xvzy-nfe2
vulnerability_id VCID-atmg-xvzy-nfe2
summary
A buffer overflow in the XRender extension potentially allows any X.Org
    user to execute arbitrary code with elevated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1526.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1526
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63218
published_at 2026-04-01T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63277
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-04T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63271
published_at 2026-04-07T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63323
published_at 2026-04-08T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63341
published_at 2026-04-09T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63359
published_at 2026-04-11T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63342
published_at 2026-04-12T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-13T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.6334
published_at 2026-04-16T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63348
published_at 2026-04-18T12:55:00Z
11
value 0.00443
scoring_system epss
scoring_elements 0.63327
published_at 2026-04-21T12:55:00Z
12
value 0.00443
scoring_system epss
scoring_elements 0.63346
published_at 2026-04-24T12:55:00Z
13
value 0.00443
scoring_system epss
scoring_elements 0.63358
published_at 2026-04-26T12:55:00Z
14
value 0.00443
scoring_system epss
scoring_elements 0.63356
published_at 2026-04-29T12:55:00Z
15
value 0.00443
scoring_system epss
scoring_elements 0.63328
published_at 2026-05-05T12:55:00Z
16
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-05-07T12:55:00Z
17
value 0.00443
scoring_system epss
scoring_elements 0.63425
published_at 2026-05-09T12:55:00Z
18
value 0.00443
scoring_system epss
scoring_elements 0.6339
published_at 2026-05-11T12:55:00Z
19
value 0.00443
scoring_system epss
scoring_elements 0.63417
published_at 2026-05-12T12:55:00Z
20
value 0.00443
scoring_system epss
scoring_elements 0.63471
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1526
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618042
reference_id 1618042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618042
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378464
reference_id 378464
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378464
5
reference_url https://security.gentoo.org/glsa/200605-02
reference_id GLSA-200605-02
reference_type
scores
url https://security.gentoo.org/glsa/200605-02
6
reference_url https://access.redhat.com/errata/RHSA-2006:0451
reference_id RHSA-2006:0451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0451
7
reference_url https://usn.ubuntu.com/280-1/
reference_id USN-280-1
reference_type
scores
url https://usn.ubuntu.com/280-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@1:1.0.2-8?distro=trixie
purl pkg:deb/debian/xorg-server@1:1.0.2-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@1:1.0.2-8%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2006-1526
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atmg-xvzy-nfe2
44
url VCID-bv8h-xa48-hbh7
vulnerability_id VCID-bv8h-xa48-hbh7
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2319
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10418
published_at 2026-05-14T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1032
published_at 2026-05-11T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10359
published_at 2026-05-12T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10222
published_at 2026-04-02T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10287
published_at 2026-04-04T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10183
published_at 2026-04-07T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10257
published_at 2026-04-08T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10319
published_at 2026-04-09T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10349
published_at 2026-04-11T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10308
published_at 2026-04-12T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10289
published_at 2026-04-13T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10164
published_at 2026-04-16T12:55:00Z
12
value 0.00035
scoring_system epss
scoring_elements 0.10138
published_at 2026-04-18T12:55:00Z
13
value 0.00035
scoring_system epss
scoring_elements 0.10269
published_at 2026-04-21T12:55:00Z
14
value 0.00035
scoring_system epss
scoring_elements 0.10249
published_at 2026-04-24T12:55:00Z
15
value 0.00035
scoring_system epss
scoring_elements 0.10237
published_at 2026-04-26T12:55:00Z
16
value 0.00035
scoring_system epss
scoring_elements 0.10182
published_at 2026-04-29T12:55:00Z
17
value 0.00035
scoring_system epss
scoring_elements 0.10126
published_at 2026-05-05T12:55:00Z
18
value 0.00035
scoring_system epss
scoring_elements 0.10274
published_at 2026-05-07T12:55:00Z
19
value 0.00035
scoring_system epss
scoring_elements 0.10343
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2319
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
reference_id 1014903
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106671
reference_id 2106671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106671
7
reference_url https://security.archlinux.org/AVG-2770
reference_id AVG-2770
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2770
8
reference_url https://security.gentoo.org/glsa/202210-30
reference_id GLSA-202210-30
reference_type
scores
url https://security.gentoo.org/glsa/202210-30
9
reference_url https://access.redhat.com/errata/RHSA-2022:5905
reference_id RHSA-2022:5905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5905
10
reference_url https://access.redhat.com/errata/RHSA-2022:7583
reference_id RHSA-2022:7583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7583
11
reference_url https://access.redhat.com/errata/RHSA-2022:8221
reference_id RHSA-2022:8221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8221
12
reference_url https://access.redhat.com/errata/RHSA-2022:8222
reference_id RHSA-2022:8222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8222
13
reference_url https://usn.ubuntu.com/5510-1/
reference_id USN-5510-1
reference_type
scores
url https://usn.ubuntu.com/5510-1/
14
reference_url https://usn.ubuntu.com/5510-2/
reference_id USN-5510-2
reference_type
scores
url https://usn.ubuntu.com/5510-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-2319
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv8h-xa48-hbh7
45
url VCID-bvay-s9w4-muf8
vulnerability_id VCID-bvay-s9w4-muf8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3551
reference_id
reference_type
scores
0
value 0.0063
scoring_system epss
scoring_elements 0.70472
published_at 2026-05-14T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.73079
published_at 2026-04-02T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73099
published_at 2026-04-04T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.73073
published_at 2026-04-07T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73109
published_at 2026-04-08T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73123
published_at 2026-04-09T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73148
published_at 2026-04-11T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73127
published_at 2026-04-12T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73121
published_at 2026-04-13T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.73164
published_at 2026-04-16T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73174
published_at 2026-04-18T12:55:00Z
11
value 0.00749
scoring_system epss
scoring_elements 0.73165
published_at 2026-04-21T12:55:00Z
12
value 0.00749
scoring_system epss
scoring_elements 0.73201
published_at 2026-04-24T12:55:00Z
13
value 0.00749
scoring_system epss
scoring_elements 0.73214
published_at 2026-04-26T12:55:00Z
14
value 0.00749
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-29T12:55:00Z
15
value 0.00749
scoring_system epss
scoring_elements 0.73206
published_at 2026-05-05T12:55:00Z
16
value 0.00749
scoring_system epss
scoring_elements 0.73233
published_at 2026-05-07T12:55:00Z
17
value 0.00749
scoring_system epss
scoring_elements 0.73257
published_at 2026-05-09T12:55:00Z
18
value 0.00749
scoring_system epss
scoring_elements 0.73217
published_at 2026-05-11T12:55:00Z
19
value 0.00749
scoring_system epss
scoring_elements 0.73241
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140701
reference_id 2140701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140701
6
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
7
reference_url https://access.redhat.com/errata/RHSA-2022:8491
reference_id RHSA-2022:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8491
8
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
9
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
10
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
11
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
12
reference_url https://usn.ubuntu.com/5740-1/
reference_id USN-5740-1
reference_type
scores
url https://usn.ubuntu.com/5740-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.4-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.4-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-3%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-3551
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bvay-s9w4-muf8
46
url VCID-c81n-kx59-q7h5
vulnerability_id VCID-c81n-kx59-q7h5
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12180
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75383
published_at 2026-05-14T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75242
published_at 2026-04-18T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75233
published_at 2026-04-21T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-24T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.75273
published_at 2026-04-26T12:55:00Z
5
value 0.00871
scoring_system epss
scoring_elements 0.75277
published_at 2026-04-29T12:55:00Z
6
value 0.00871
scoring_system epss
scoring_elements 0.75286
published_at 2026-05-05T12:55:00Z
7
value 0.00871
scoring_system epss
scoring_elements 0.75313
published_at 2026-05-07T12:55:00Z
8
value 0.00871
scoring_system epss
scoring_elements 0.75338
published_at 2026-05-09T12:55:00Z
9
value 0.00871
scoring_system epss
scoring_elements 0.75319
published_at 2026-05-11T12:55:00Z
10
value 0.00871
scoring_system epss
scoring_elements 0.75327
published_at 2026-05-12T12:55:00Z
11
value 0.00871
scoring_system epss
scoring_elements 0.75236
published_at 2026-04-16T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
14
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
15
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
16
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
17
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
18
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
19
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509221
reference_id 1509221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509221
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12180
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c81n-kx59-q7h5
47
url VCID-c9vv-1x48-9uej
vulnerability_id VCID-c9vv-1x48-9uej
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8094.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8094
reference_id
reference_type
scores
0
value 0.01042
scoring_system epss
scoring_elements 0.77637
published_at 2026-05-14T12:55:00Z
1
value 0.01042
scoring_system epss
scoring_elements 0.77386
published_at 2026-04-01T12:55:00Z
2
value 0.01042
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-02T12:55:00Z
3
value 0.01042
scoring_system epss
scoring_elements 0.77419
published_at 2026-04-04T12:55:00Z
4
value 0.01042
scoring_system epss
scoring_elements 0.77399
published_at 2026-04-07T12:55:00Z
5
value 0.01042
scoring_system epss
scoring_elements 0.77429
published_at 2026-04-08T12:55:00Z
6
value 0.01042
scoring_system epss
scoring_elements 0.77439
published_at 2026-04-09T12:55:00Z
7
value 0.01042
scoring_system epss
scoring_elements 0.77464
published_at 2026-04-11T12:55:00Z
8
value 0.01042
scoring_system epss
scoring_elements 0.77445
published_at 2026-04-12T12:55:00Z
9
value 0.01042
scoring_system epss
scoring_elements 0.77441
published_at 2026-04-13T12:55:00Z
10
value 0.01042
scoring_system epss
scoring_elements 0.77481
published_at 2026-04-16T12:55:00Z
11
value 0.01042
scoring_system epss
scoring_elements 0.77479
published_at 2026-04-18T12:55:00Z
12
value 0.01042
scoring_system epss
scoring_elements 0.77472
published_at 2026-04-21T12:55:00Z
13
value 0.01042
scoring_system epss
scoring_elements 0.77506
published_at 2026-04-24T12:55:00Z
14
value 0.01042
scoring_system epss
scoring_elements 0.77513
published_at 2026-04-26T12:55:00Z
15
value 0.01042
scoring_system epss
scoring_elements 0.77528
published_at 2026-04-29T12:55:00Z
16
value 0.01042
scoring_system epss
scoring_elements 0.77534
published_at 2026-05-05T12:55:00Z
17
value 0.01042
scoring_system epss
scoring_elements 0.77562
published_at 2026-05-07T12:55:00Z
18
value 0.01042
scoring_system epss
scoring_elements 0.77584
published_at 2026-05-09T12:55:00Z
19
value 0.01042
scoring_system epss
scoring_elements 0.77572
published_at 2026-05-11T12:55:00Z
20
value 0.01042
scoring_system epss
scoring_elements 0.7759
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8094
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.securityfocus.com/bid/71601
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71601
21
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168691
reference_id 1168691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168691
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8094
reference_id CVE-2014-8094
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8094
184
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
185
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
186
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8094
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9vv-1x48-9uej
48
url VCID-cfjq-38mk-hbhf
vulnerability_id VCID-cfjq-38mk-hbhf
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12181
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74935
published_at 2026-05-14T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74864
published_at 2026-05-11T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74883
published_at 2026-05-12T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
14
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
15
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
16
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
17
value 0.00843
scoring_system epss
scoring_elements 0.74838
published_at 2026-05-05T12:55:00Z
18
value 0.00843
scoring_system epss
scoring_elements 0.74867
published_at 2026-05-07T12:55:00Z
19
value 0.00843
scoring_system epss
scoring_elements 0.74892
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509222
reference_id 1509222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509222
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12181
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfjq-38mk-hbhf
49
url VCID-crec-pfnb-hbgm
vulnerability_id VCID-crec-pfnb-hbgm
summary X.org: ProcRenderAddGlyphs input sanitization flaw
references
0
reference_url http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc
1
reference_url http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718
reference_id
reference_type
scores
url http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718
2
reference_url http://rhn.redhat.com/errata/RHSA-2011-1359.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-1359.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-1360.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-1360.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4819.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4819
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22364
published_at 2026-05-14T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22389
published_at 2026-04-01T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22557
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22599
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22386
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22468
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22523
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22542
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22501
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22446
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22462
published_at 2026-04-16T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-18T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22408
published_at 2026-04-21T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22256
published_at 2026-04-24T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22242
published_at 2026-04-26T12:55:00Z
15
value 0.00074
scoring_system epss
scoring_elements 0.22237
published_at 2026-04-29T12:55:00Z
16
value 0.00074
scoring_system epss
scoring_elements 0.22134
published_at 2026-05-05T12:55:00Z
17
value 0.00074
scoring_system epss
scoring_elements 0.22218
published_at 2026-05-07T12:55:00Z
18
value 0.00074
scoring_system epss
scoring_elements 0.22297
published_at 2026-05-09T12:55:00Z
19
value 0.00074
scoring_system epss
scoring_elements 0.22265
published_at 2026-05-11T12:55:00Z
20
value 0.00074
scoring_system epss
scoring_elements 0.22282
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4819
6
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=28801
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=28801
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819
8
reference_url http://securitytracker.com/id?1026149
reference_id
reference_type
scores
url http://securitytracker.com/id?1026149
9
reference_url http://www.openwall.com/lists/oss-security/2011/09/22/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/09/22/8
10
reference_url http://www.openwall.com/lists/oss-security/2011/09/23/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/09/23/5
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=740961
reference_id 740961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=740961
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x.org-xserver:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.6.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x.org-xserver:1.7.6.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.6.902:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.7:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x.org-xserver:1.7.7:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.7.7:rc2:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4819
reference_id CVE-2010-4819
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4819
17
reference_url https://access.redhat.com/errata/RHSA-2011:1359
reference_id RHSA-2011:1359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1359
18
reference_url https://access.redhat.com/errata/RHSA-2011:1360
reference_id RHSA-2011:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1360
19
reference_url https://usn.ubuntu.com/1232-1/
reference_id USN-1232-1
reference_type
scores
url https://usn.ubuntu.com/1232-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.9.0.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.9.0.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.9.0.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2010-4819
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-crec-pfnb-hbgm
50
url VCID-dcdh-w9a1-wfff
vulnerability_id VCID-dcdh-w9a1-wfff
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12185
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74935
published_at 2026-05-14T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74864
published_at 2026-05-11T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74883
published_at 2026-05-12T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74711
published_at 2026-04-07T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-04T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74744
published_at 2026-04-08T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-09T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74782
published_at 2026-04-11T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-12T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74752
published_at 2026-04-13T12:55:00Z
11
value 0.00843
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-16T12:55:00Z
12
value 0.00843
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-18T12:55:00Z
13
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-21T12:55:00Z
14
value 0.00843
scoring_system epss
scoring_elements 0.74822
published_at 2026-04-24T12:55:00Z
15
value 0.00843
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-26T12:55:00Z
16
value 0.00843
scoring_system epss
scoring_elements 0.74833
published_at 2026-04-29T12:55:00Z
17
value 0.00843
scoring_system epss
scoring_elements 0.74838
published_at 2026-05-05T12:55:00Z
18
value 0.00843
scoring_system epss
scoring_elements 0.74867
published_at 2026-05-07T12:55:00Z
19
value 0.00843
scoring_system epss
scoring_elements 0.74892
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509215
reference_id 1509215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509215
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcdh-w9a1-wfff
51
url VCID-e7w3-3hpm-hbec
vulnerability_id VCID-e7w3-3hpm-hbec
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38737
published_at 2026-05-14T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39121
published_at 2026-04-02T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-04T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39063
published_at 2026-04-07T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-08T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39135
published_at 2026-04-09T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39146
published_at 2026-04-11T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-12T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-13T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.38638
published_at 2026-05-11T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.38712
published_at 2026-05-07T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.38725
published_at 2026-05-09T12:55:00Z
12
value 0.00176
scoring_system epss
scoring_elements 0.38662
published_at 2026-05-12T12:55:00Z
13
value 0.00187
scoring_system epss
scoring_elements 0.40281
published_at 2026-04-29T12:55:00Z
14
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
15
value 0.00187
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-18T12:55:00Z
16
value 0.00187
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-21T12:55:00Z
17
value 0.00187
scoring_system epss
scoring_elements 0.40375
published_at 2026-04-24T12:55:00Z
18
value 0.00187
scoring_system epss
scoring_elements 0.40362
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
reference_id 2151761
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-4283
reference_id CVE-2022-4283
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://access.redhat.com/security/cve/CVE-2022-4283
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-4283
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec
52
url VCID-e9px-edn1-tufs
vulnerability_id VCID-e9px-edn1-tufs
summary xorg: xmayland: Use-after-free in XPresentNotify structure creation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62229
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01112
published_at 2026-04-04T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01109
published_at 2026-04-02T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-07T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01124
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01589
published_at 2026-04-21T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02815
published_at 2026-05-14T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02758
published_at 2026-04-29T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.0273
published_at 2026-05-05T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02746
published_at 2026-05-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02784
published_at 2026-05-09T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02785
published_at 2026-05-12T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02664
published_at 2026-04-09T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.0264
published_at 2026-04-11T12:55:00Z
13
value 0.00014
scoring_system epss
scoring_elements 0.02626
published_at 2026-04-12T12:55:00Z
14
value 0.00014
scoring_system epss
scoring_elements 0.02624
published_at 2026-04-13T12:55:00Z
15
value 0.00014
scoring_system epss
scoring_elements 0.02607
published_at 2026-04-16T12:55:00Z
16
value 0.00014
scoring_system epss
scoring_elements 0.02615
published_at 2026-04-18T12:55:00Z
17
value 0.00014
scoring_system epss
scoring_elements 0.02716
published_at 2026-04-24T12:55:00Z
18
value 0.00014
scoring_system epss
scoring_elements 0.02703
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402649
reference_id 2402649
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402649
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62229
reference_id CVE-2025-62229
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/security/cve/CVE-2025-62229
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u17%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.20-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-62229
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9px-edn1-tufs
53
url VCID-ebqr-xztt-y3bj
vulnerability_id VCID-ebqr-xztt-y3bj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12187
reference_id
reference_type
scores
0
value 0.00773
scoring_system epss
scoring_elements 0.73526
published_at 2026-04-01T12:55:00Z
1
value 0.00773
scoring_system epss
scoring_elements 0.73747
published_at 2026-05-14T12:55:00Z
2
value 0.00773
scoring_system epss
scoring_elements 0.73666
published_at 2026-05-11T12:55:00Z
3
value 0.00773
scoring_system epss
scoring_elements 0.73688
published_at 2026-05-12T12:55:00Z
4
value 0.00773
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-02T12:55:00Z
5
value 0.00773
scoring_system epss
scoring_elements 0.73557
published_at 2026-04-04T12:55:00Z
6
value 0.00773
scoring_system epss
scoring_elements 0.73529
published_at 2026-04-07T12:55:00Z
7
value 0.00773
scoring_system epss
scoring_elements 0.73565
published_at 2026-04-08T12:55:00Z
8
value 0.00773
scoring_system epss
scoring_elements 0.73578
published_at 2026-04-09T12:55:00Z
9
value 0.00773
scoring_system epss
scoring_elements 0.73601
published_at 2026-04-11T12:55:00Z
10
value 0.00773
scoring_system epss
scoring_elements 0.73583
published_at 2026-04-12T12:55:00Z
11
value 0.00773
scoring_system epss
scoring_elements 0.73575
published_at 2026-04-13T12:55:00Z
12
value 0.00773
scoring_system epss
scoring_elements 0.73619
published_at 2026-04-16T12:55:00Z
13
value 0.00773
scoring_system epss
scoring_elements 0.73628
published_at 2026-04-18T12:55:00Z
14
value 0.00773
scoring_system epss
scoring_elements 0.7362
published_at 2026-04-21T12:55:00Z
15
value 0.00773
scoring_system epss
scoring_elements 0.73653
published_at 2026-04-24T12:55:00Z
16
value 0.00773
scoring_system epss
scoring_elements 0.73662
published_at 2026-04-26T12:55:00Z
17
value 0.00773
scoring_system epss
scoring_elements 0.73661
published_at 2026-04-29T12:55:00Z
18
value 0.00773
scoring_system epss
scoring_elements 0.73655
published_at 2026-05-05T12:55:00Z
19
value 0.00773
scoring_system epss
scoring_elements 0.73681
published_at 2026-05-07T12:55:00Z
20
value 0.00773
scoring_system epss
scoring_elements 0.73704
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509217
reference_id 1509217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509217
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12187
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebqr-xztt-y3bj
54
url VCID-em7x-adw1-tyaz
vulnerability_id VCID-em7x-adw1-tyaz
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2320
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18368
published_at 2026-05-12T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-05-09T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18337
published_at 2026-05-11T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18692
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18747
published_at 2026-04-04T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18463
published_at 2026-05-14T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18543
published_at 2026-04-08T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18596
published_at 2026-04-09T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18599
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18552
published_at 2026-04-12T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18499
published_at 2026-04-13T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18441
published_at 2026-04-16T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.1845
published_at 2026-04-18T12:55:00Z
13
value 0.00059
scoring_system epss
scoring_elements 0.18471
published_at 2026-04-21T12:55:00Z
14
value 0.00059
scoring_system epss
scoring_elements 0.18374
published_at 2026-04-24T12:55:00Z
15
value 0.00059
scoring_system epss
scoring_elements 0.18358
published_at 2026-04-26T12:55:00Z
16
value 0.00059
scoring_system epss
scoring_elements 0.18318
published_at 2026-04-29T12:55:00Z
17
value 0.00059
scoring_system epss
scoring_elements 0.18181
published_at 2026-05-05T12:55:00Z
18
value 0.00059
scoring_system epss
scoring_elements 0.18267
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2320
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
reference_id 1014903
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014903
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106683
reference_id 2106683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106683
7
reference_url https://security.archlinux.org/AVG-2770
reference_id AVG-2770
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2770
8
reference_url https://security.gentoo.org/glsa/202210-30
reference_id GLSA-202210-30
reference_type
scores
url https://security.gentoo.org/glsa/202210-30
9
reference_url https://access.redhat.com/errata/RHSA-2022:5905
reference_id RHSA-2022:5905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5905
10
reference_url https://access.redhat.com/errata/RHSA-2022:7583
reference_id RHSA-2022:7583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7583
11
reference_url https://access.redhat.com/errata/RHSA-2022:8221
reference_id RHSA-2022:8221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8221
12
reference_url https://access.redhat.com/errata/RHSA-2022:8222
reference_id RHSA-2022:8222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8222
13
reference_url https://usn.ubuntu.com/5510-1/
reference_id USN-5510-1
reference_type
scores
url https://usn.ubuntu.com/5510-1/
14
reference_url https://usn.ubuntu.com/5510-2/
reference_id USN-5510-2
reference_type
scores
url https://usn.ubuntu.com/5510-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-2320
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-em7x-adw1-tyaz
55
url VCID-fb3m-nwqg-q7ca
vulnerability_id VCID-fb3m-nwqg-q7ca
summary
A vulnerability has been discovered in the Composite extension of the X.Org
    X server, allowing for a local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4730
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26093
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26174
published_at 2026-04-02T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26216
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25987
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26053
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26105
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26114
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-12T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.2601
published_at 2026-04-13T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26014
published_at 2026-04-16T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25992
published_at 2026-04-18T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25958
published_at 2026-04-21T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25897
published_at 2026-04-24T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25893
published_at 2026-04-26T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25845
published_at 2026-04-29T12:55:00Z
15
value 0.00097
scoring_system epss
scoring_elements 0.26377
published_at 2026-05-05T12:55:00Z
16
value 0.00097
scoring_system epss
scoring_elements 0.26447
published_at 2026-05-12T12:55:00Z
17
value 0.00097
scoring_system epss
scoring_elements 0.26503
published_at 2026-05-09T12:55:00Z
18
value 0.00097
scoring_system epss
scoring_elements 0.26431
published_at 2026-05-11T12:55:00Z
19
value 0.00097
scoring_system epss
scoring_elements 0.26526
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=285991
reference_id 285991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=285991
4
reference_url https://security.gentoo.org/glsa/200710-16
reference_id GLSA-200710-16
reference_type
scores
url https://security.gentoo.org/glsa/200710-16
5
reference_url https://access.redhat.com/errata/RHSA-2007:0898
reference_id RHSA-2007:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0898
6
reference_url https://usn.ubuntu.com/514-1/
reference_id USN-514-1
reference_type
scores
url https://usn.ubuntu.com/514-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-4730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fb3m-nwqg-q7ca
56
url VCID-fcac-qzvs-rfa8
vulnerability_id VCID-fcac-qzvs-rfa8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4010
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23318
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23254
published_at 2026-05-14T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23197
published_at 2026-05-09T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23159
published_at 2026-05-11T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23176
published_at 2026-05-12T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23492
published_at 2026-04-02T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23528
published_at 2026-04-04T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23312
published_at 2026-04-07T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23384
published_at 2026-04-08T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23435
published_at 2026-04-09T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23455
published_at 2026-04-11T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23417
published_at 2026-04-12T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-13T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.2338
published_at 2026-04-16T12:55:00Z
14
value 0.00079
scoring_system epss
scoring_elements 0.23375
published_at 2026-04-18T12:55:00Z
15
value 0.00079
scoring_system epss
scoring_elements 0.23355
published_at 2026-04-21T12:55:00Z
16
value 0.00079
scoring_system epss
scoring_elements 0.23164
published_at 2026-04-24T12:55:00Z
17
value 0.00079
scoring_system epss
scoring_elements 0.23154
published_at 2026-04-26T12:55:00Z
18
value 0.00079
scoring_system epss
scoring_elements 0.23145
published_at 2026-04-29T12:55:00Z
19
value 0.00079
scoring_system epss
scoring_elements 0.23039
published_at 2026-05-05T12:55:00Z
20
value 0.00079
scoring_system epss
scoring_elements 0.23122
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026073
reference_id 2026073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026073
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2021-4010
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fcac-qzvs-rfa8
57
url VCID-fgnr-h7rm-83d4
vulnerability_id VCID-fgnr-h7rm-83d4
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0409
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03226
published_at 2026-05-14T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03005
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-21T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03124
published_at 2026-04-24T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03114
published_at 2026-04-26T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-29T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03117
published_at 2026-05-05T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03143
published_at 2026-05-07T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03179
published_at 2026-05-09T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03187
published_at 2026-05-11T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03193
published_at 2026-05-12T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04809
published_at 2026-04-13T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04852
published_at 2026-04-11T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.04829
published_at 2026-04-12T12:55:00Z
14
value 0.00018
scoring_system epss
scoring_elements 0.04757
published_at 2026-04-16T12:55:00Z
15
value 0.00018
scoring_system epss
scoring_elements 0.0478
published_at 2026-04-02T12:55:00Z
16
value 0.00018
scoring_system epss
scoring_elements 0.04803
published_at 2026-04-04T12:55:00Z
17
value 0.00018
scoring_system epss
scoring_elements 0.0482
published_at 2026-04-07T12:55:00Z
18
value 0.00018
scoring_system epss
scoring_elements 0.04858
published_at 2026-04-08T12:55:00Z
19
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257690
reference_id 2257690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0409
reference_id CVE-2024-0409
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/security/cve/CVE-2024-0409
23
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
24
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:0320
25
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2169
26
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2170
27
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2995
28
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2996
29
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
30
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-0409
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgnr-h7rm-83d4
58
url VCID-fpny-yp5d-zbcu
vulnerability_id VCID-fpny-yp5d-zbcu
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12182
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.7654
published_at 2026-05-14T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76475
published_at 2026-05-11T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.7649
published_at 2026-05-12T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-16T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76411
published_at 2026-04-18T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76396
published_at 2026-04-21T12:55:00Z
14
value 0.0095
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-24T12:55:00Z
15
value 0.0095
scoring_system epss
scoring_elements 0.76436
published_at 2026-04-26T12:55:00Z
16
value 0.0095
scoring_system epss
scoring_elements 0.7645
published_at 2026-04-29T12:55:00Z
17
value 0.0095
scoring_system epss
scoring_elements 0.76438
published_at 2026-05-05T12:55:00Z
18
value 0.0095
scoring_system epss
scoring_elements 0.76467
published_at 2026-05-07T12:55:00Z
19
value 0.0095
scoring_system epss
scoring_elements 0.76487
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509223
reference_id 1509223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509223
18
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
19
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12182
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpny-yp5d-zbcu
59
url VCID-g15b-mt4a-kbhc
vulnerability_id VCID-g15b-mt4a-kbhc
summary
Multiple vulnerabilities have been discovered in the X.Org X server,
    possibly allowing for the remote execution of arbitrary code with root
    privileges.
references
0
reference_url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff
reference_id
reference_type
scores
url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
2
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0502.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0502.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2008-0504.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0504.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2008-0512.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0512.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1377.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1377.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1377
reference_id
reference_type
scores
0
value 0.02373
scoring_system epss
scoring_elements 0.8512
published_at 2026-05-14T12:55:00Z
1
value 0.02373
scoring_system epss
scoring_elements 0.84886
published_at 2026-04-01T12:55:00Z
2
value 0.02373
scoring_system epss
scoring_elements 0.84902
published_at 2026-04-02T12:55:00Z
3
value 0.02373
scoring_system epss
scoring_elements 0.8492
published_at 2026-04-04T12:55:00Z
4
value 0.02373
scoring_system epss
scoring_elements 0.84924
published_at 2026-04-07T12:55:00Z
5
value 0.02373
scoring_system epss
scoring_elements 0.84947
published_at 2026-04-08T12:55:00Z
6
value 0.02373
scoring_system epss
scoring_elements 0.84954
published_at 2026-04-09T12:55:00Z
7
value 0.02373
scoring_system epss
scoring_elements 0.8497
published_at 2026-04-11T12:55:00Z
8
value 0.02373
scoring_system epss
scoring_elements 0.84968
published_at 2026-04-12T12:55:00Z
9
value 0.02373
scoring_system epss
scoring_elements 0.84964
published_at 2026-04-13T12:55:00Z
10
value 0.02373
scoring_system epss
scoring_elements 0.84985
published_at 2026-04-16T12:55:00Z
11
value 0.02373
scoring_system epss
scoring_elements 0.84987
published_at 2026-04-18T12:55:00Z
12
value 0.02373
scoring_system epss
scoring_elements 0.84984
published_at 2026-04-21T12:55:00Z
13
value 0.02373
scoring_system epss
scoring_elements 0.85009
published_at 2026-04-24T12:55:00Z
14
value 0.02373
scoring_system epss
scoring_elements 0.85017
published_at 2026-04-26T12:55:00Z
15
value 0.02373
scoring_system epss
scoring_elements 0.85016
published_at 2026-04-29T12:55:00Z
16
value 0.02373
scoring_system epss
scoring_elements 0.85031
published_at 2026-05-05T12:55:00Z
17
value 0.02373
scoring_system epss
scoring_elements 0.85055
published_at 2026-05-07T12:55:00Z
18
value 0.02373
scoring_system epss
scoring_elements 0.85075
published_at 2026-05-09T12:55:00Z
19
value 0.02373
scoring_system epss
scoring_elements 0.85072
published_at 2026-05-11T12:55:00Z
20
value 0.02373
scoring_system epss
scoring_elements 0.85087
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1377
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377
13
reference_url http://secunia.com/advisories/30627
reference_id
reference_type
scores
url http://secunia.com/advisories/30627
14
reference_url http://secunia.com/advisories/30628
reference_id
reference_type
scores
url http://secunia.com/advisories/30628
15
reference_url http://secunia.com/advisories/30629
reference_id
reference_type
scores
url http://secunia.com/advisories/30629
16
reference_url http://secunia.com/advisories/30630
reference_id
reference_type
scores
url http://secunia.com/advisories/30630
17
reference_url http://secunia.com/advisories/30637
reference_id
reference_type
scores
url http://secunia.com/advisories/30637
18
reference_url http://secunia.com/advisories/30659
reference_id
reference_type
scores
url http://secunia.com/advisories/30659
19
reference_url http://secunia.com/advisories/30664
reference_id
reference_type
scores
url http://secunia.com/advisories/30664
20
reference_url http://secunia.com/advisories/30666
reference_id
reference_type
scores
url http://secunia.com/advisories/30666
21
reference_url http://secunia.com/advisories/30671
reference_id
reference_type
scores
url http://secunia.com/advisories/30671
22
reference_url http://secunia.com/advisories/30715
reference_id
reference_type
scores
url http://secunia.com/advisories/30715
23
reference_url http://secunia.com/advisories/30772
reference_id
reference_type
scores
url http://secunia.com/advisories/30772
24
reference_url http://secunia.com/advisories/30809
reference_id
reference_type
scores
url http://secunia.com/advisories/30809
25
reference_url http://secunia.com/advisories/30843
reference_id
reference_type
scores
url http://secunia.com/advisories/30843
26
reference_url http://secunia.com/advisories/31025
reference_id
reference_type
scores
url http://secunia.com/advisories/31025
27
reference_url http://secunia.com/advisories/31109
reference_id
reference_type
scores
url http://secunia.com/advisories/31109
28
reference_url http://secunia.com/advisories/32099
reference_id
reference_type
scores
url http://secunia.com/advisories/32099
29
reference_url http://secunia.com/advisories/32545
reference_id
reference_type
scores
url http://secunia.com/advisories/32545
30
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
31
reference_url http://security.gentoo.org/glsa/glsa-200806-07.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-07.xml
32
reference_url http://securitytracker.com/id?1020247
reference_id
reference_type
scores
url http://securitytracker.com/id?1020247
33
reference_url https://issues.rpath.com/browse/RPL-2607
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2607
34
reference_url https://issues.rpath.com/browse/RPL-2619
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2619
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109
36
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
37
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
38
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
39
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
40
reference_url http://www.debian.org/security/2008/dsa-1595
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1595
41
reference_url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
42
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
43
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
44
reference_url http://www.redhat.com/support/errata/RHSA-2008-0503.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0503.html
45
reference_url http://www.securityfocus.com/archive/1/493548/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493548/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/493550/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493550/100/0/threaded
47
reference_url http://www.ubuntu.com/usn/usn-616-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-616-1
48
reference_url http://www.vupen.com/english/advisories/2008/1803
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1803
49
reference_url http://www.vupen.com/english/advisories/2008/1833
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1833
50
reference_url http://www.vupen.com/english/advisories/2008/1983/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1983/references
51
reference_url http://www.vupen.com/english/advisories/2008/3000
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3000
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=445403
reference_id 445403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=445403
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1377
reference_id CVE-2008-1377
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-1377
55
reference_url https://security.gentoo.org/glsa/200806-07
reference_id GLSA-200806-07
reference_type
scores
url https://security.gentoo.org/glsa/200806-07
56
reference_url https://access.redhat.com/errata/RHSA-2008:0502
reference_id RHSA-2008:0502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0502
57
reference_url https://access.redhat.com/errata/RHSA-2008:0503
reference_id RHSA-2008:0503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0503
58
reference_url https://access.redhat.com/errata/RHSA-2008:0504
reference_id RHSA-2008:0504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0504
59
reference_url https://access.redhat.com/errata/RHSA-2008:0512
reference_id RHSA-2008:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0512
60
reference_url https://usn.ubuntu.com/616-1/
reference_id USN-616-1
reference_type
scores
url https://usn.ubuntu.com/616-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2008-1377
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g15b-mt4a-kbhc
60
url VCID-h242-94ba-ykcb
vulnerability_id VCID-h242-94ba-ykcb
summary
Multiple vulnerabilities have been found in X.Org X Server, the
    worst of which may allow authenticated attackers to read from or send
    information to arbitrary X11 clients.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3164
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20212
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.2036
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20421
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20146
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20227
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20286
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20313
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20267
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20209
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20201
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20205
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20203
published_at 2026-04-21T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.20082
published_at 2026-04-24T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.20077
published_at 2026-04-26T12:55:00Z
14
value 0.00065
scoring_system epss
scoring_elements 0.20046
published_at 2026-04-29T12:55:00Z
15
value 0.00065
scoring_system epss
scoring_elements 0.19954
published_at 2026-05-05T12:55:00Z
16
value 0.00065
scoring_system epss
scoring_elements 0.20031
published_at 2026-05-07T12:55:00Z
17
value 0.00065
scoring_system epss
scoring_elements 0.20115
published_at 2026-05-09T12:55:00Z
18
value 0.00065
scoring_system epss
scoring_elements 0.20086
published_at 2026-05-11T12:55:00Z
19
value 0.00065
scoring_system epss
scoring_elements 0.2011
published_at 2026-05-12T12:55:00Z
20
value 0.00065
scoring_system epss
scoring_elements 0.202
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3164
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1219548
reference_id 1219548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1219548
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410
reference_id 788410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788410
5
reference_url https://security.gentoo.org/glsa/201701-64
reference_id GLSA-201701-64
reference_type
scores
url https://security.gentoo.org/glsa/201701-64
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.17.2-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.17.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.17.2-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2015-3164
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h242-94ba-ykcb
61
url VCID-hhnr-av5b-t7dc
vulnerability_id VCID-hhnr-av5b-t7dc
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14362
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39256
published_at 2026-04-01T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39447
published_at 2026-04-04T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39361
published_at 2026-04-07T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39416
published_at 2026-04-08T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39432
published_at 2026-04-09T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39443
published_at 2026-04-11T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39405
published_at 2026-04-12T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-13T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39438
published_at 2026-04-16T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.3941
published_at 2026-04-18T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39323
published_at 2026-04-21T12:55:00Z
12
value 0.00178
scoring_system epss
scoring_elements 0.39127
published_at 2026-04-24T12:55:00Z
13
value 0.00178
scoring_system epss
scoring_elements 0.39108
published_at 2026-04-26T12:55:00Z
14
value 0.00178
scoring_system epss
scoring_elements 0.39028
published_at 2026-04-29T12:55:00Z
15
value 0.00178
scoring_system epss
scoring_elements 0.38901
published_at 2026-05-05T12:55:00Z
16
value 0.00178
scoring_system epss
scoring_elements 0.38973
published_at 2026-05-07T12:55:00Z
17
value 0.00178
scoring_system epss
scoring_elements 0.3899
published_at 2026-05-09T12:55:00Z
18
value 0.00178
scoring_system epss
scoring_elements 0.389
published_at 2026-05-11T12:55:00Z
19
value 0.00178
scoring_system epss
scoring_elements 0.38922
published_at 2026-05-12T12:55:00Z
20
value 0.00178
scoring_system epss
scoring_elements 0.38996
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869144
reference_id 1869144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869144
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
14
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2020-14362
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhnr-av5b-t7dc
62
url VCID-hkrr-v71f-xqdb
vulnerability_id VCID-hkrr-v71f-xqdb
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26601
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08223
published_at 2026-05-07T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.0809
published_at 2026-05-05T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
14
value 0.00034
scoring_system epss
scoring_elements 0.10297
published_at 2026-05-14T12:55:00Z
15
value 0.00034
scoring_system epss
scoring_elements 0.10223
published_at 2026-05-09T12:55:00Z
16
value 0.00034
scoring_system epss
scoring_elements 0.102
published_at 2026-05-11T12:55:00Z
17
value 0.00034
scoring_system epss
scoring_elements 0.10239
published_at 2026-05-12T12:55:00Z
18
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
19
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345251
reference_id 2345251
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345251
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26601
reference_id CVE-2025-26601
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/security/cve/CVE-2025-26601
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26601
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkrr-v71f-xqdb
63
url VCID-hsa9-8jn1-jyhr
vulnerability_id VCID-hsa9-8jn1-jyhr
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8101.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8101
reference_id
reference_type
scores
0
value 0.01269
scoring_system epss
scoring_elements 0.79663
published_at 2026-05-14T12:55:00Z
1
value 0.01269
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-01T12:55:00Z
2
value 0.01269
scoring_system epss
scoring_elements 0.79434
published_at 2026-04-02T12:55:00Z
3
value 0.01269
scoring_system epss
scoring_elements 0.79458
published_at 2026-04-04T12:55:00Z
4
value 0.01269
scoring_system epss
scoring_elements 0.79445
published_at 2026-04-07T12:55:00Z
5
value 0.01269
scoring_system epss
scoring_elements 0.79473
published_at 2026-04-08T12:55:00Z
6
value 0.01269
scoring_system epss
scoring_elements 0.79482
published_at 2026-04-09T12:55:00Z
7
value 0.01269
scoring_system epss
scoring_elements 0.79504
published_at 2026-04-11T12:55:00Z
8
value 0.01269
scoring_system epss
scoring_elements 0.79487
published_at 2026-04-12T12:55:00Z
9
value 0.01269
scoring_system epss
scoring_elements 0.79476
published_at 2026-04-13T12:55:00Z
10
value 0.01269
scoring_system epss
scoring_elements 0.79507
published_at 2026-04-16T12:55:00Z
11
value 0.01269
scoring_system epss
scoring_elements 0.79505
published_at 2026-04-18T12:55:00Z
12
value 0.01269
scoring_system epss
scoring_elements 0.79509
published_at 2026-04-21T12:55:00Z
13
value 0.01269
scoring_system epss
scoring_elements 0.79541
published_at 2026-04-24T12:55:00Z
14
value 0.01269
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-26T12:55:00Z
15
value 0.01269
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-29T12:55:00Z
16
value 0.01269
scoring_system epss
scoring_elements 0.79577
published_at 2026-05-05T12:55:00Z
17
value 0.01269
scoring_system epss
scoring_elements 0.79599
published_at 2026-05-07T12:55:00Z
18
value 0.01269
scoring_system epss
scoring_elements 0.79616
published_at 2026-05-09T12:55:00Z
19
value 0.01269
scoring_system epss
scoring_elements 0.79612
published_at 2026-05-11T12:55:00Z
20
value 0.01269
scoring_system epss
scoring_elements 0.79625
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8101
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
21
reference_url http://www.securityfocus.com/bid/71605
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71605
22
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168713
reference_id 1168713
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168713
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8101
reference_id CVE-2014-8101
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8101
28
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
29
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
30
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
31
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8101
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsa9-8jn1-jyhr
64
url VCID-hu5s-38nd-uqbs
vulnerability_id VCID-hu5s-38nd-uqbs
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1056.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1056
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16772
published_at 2026-04-01T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16938
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16994
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16776
published_at 2026-04-07T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16865
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16922
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16896
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16851
published_at 2026-04-12T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16793
published_at 2026-04-13T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16728
published_at 2026-04-16T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16734
published_at 2026-04-18T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.1677
published_at 2026-04-21T12:55:00Z
12
value 0.00054
scoring_system epss
scoring_elements 0.16676
published_at 2026-04-24T12:55:00Z
13
value 0.00054
scoring_system epss
scoring_elements 0.16663
published_at 2026-04-26T12:55:00Z
14
value 0.00054
scoring_system epss
scoring_elements 0.16629
published_at 2026-04-29T12:55:00Z
15
value 0.00054
scoring_system epss
scoring_elements 0.16495
published_at 2026-05-05T12:55:00Z
16
value 0.00054
scoring_system epss
scoring_elements 0.16615
published_at 2026-05-07T12:55:00Z
17
value 0.00054
scoring_system epss
scoring_elements 0.1672
published_at 2026-05-09T12:55:00Z
18
value 0.00054
scoring_system epss
scoring_elements 0.16685
published_at 2026-05-11T12:55:00Z
19
value 0.00054
scoring_system epss
scoring_elements 0.16722
published_at 2026-05-12T12:55:00Z
20
value 0.00054
scoring_system epss
scoring_elements 0.16808
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1056
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1052324
reference_id 1052324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1052324
3
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
4
reference_url https://usn.ubuntu.com/1990-1/
reference_id USN-1990-1
reference_type
scores
url https://usn.ubuntu.com/1990-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@0?distro=trixie
purl pkg:deb/debian/xorg-server@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@0%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2013-1056
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hu5s-38nd-uqbs
65
url VCID-hzj2-b4e4-ubf6
vulnerability_id VCID-hzj2-b4e4-ubf6
summary
A vulnerability in X.Org X Server may allow users to escalate
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3472.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3472
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26016
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25804
published_at 2026-05-14T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25786
published_at 2026-05-09T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25712
published_at 2026-05-11T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.25729
published_at 2026-05-12T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.261
published_at 2026-04-02T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26139
published_at 2026-04-04T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.25905
published_at 2026-04-07T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.25973
published_at 2026-04-08T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26025
published_at 2026-04-09T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26035
published_at 2026-04-11T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.2599
published_at 2026-04-12T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25931
published_at 2026-04-13T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25936
published_at 2026-04-16T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-18T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.25888
published_at 2026-04-21T12:55:00Z
16
value 0.00093
scoring_system epss
scoring_elements 0.25823
published_at 2026-04-24T12:55:00Z
17
value 0.00093
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-26T12:55:00Z
18
value 0.00093
scoring_system epss
scoring_elements 0.2577
published_at 2026-04-29T12:55:00Z
19
value 0.00093
scoring_system epss
scoring_elements 0.2566
published_at 2026-05-05T12:55:00Z
20
value 0.00093
scoring_system epss
scoring_elements 0.25725
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3472
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944167
reference_id 1944167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944167
5
reference_url https://security.archlinux.org/AVG-1811
reference_id AVG-1811
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1811
6
reference_url https://security.archlinux.org/AVG-1812
reference_id AVG-1812
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1812
7
reference_url https://security.gentoo.org/glsa/202104-02
reference_id GLSA-202104-02
reference_type
scores
url https://security.gentoo.org/glsa/202104-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2033
reference_id RHSA-2021:2033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2033
9
reference_url https://usn.ubuntu.com/4905-1/
reference_id USN-4905-1
reference_type
scores
url https://usn.ubuntu.com/4905-1/
10
reference_url https://usn.ubuntu.com/4905-2/
reference_id USN-4905-2
reference_type
scores
url https://usn.ubuntu.com/4905-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2021-3472
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hzj2-b4e4-ubf6
66
url VCID-j6qd-r6ua-cfbm
vulnerability_id VCID-j6qd-r6ua-cfbm
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.4697
published_at 2026-05-14T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46844
published_at 2026-05-05T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46906
published_at 2026-05-07T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46925
published_at 2026-05-09T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46868
published_at 2026-05-11T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.469
published_at 2026-05-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
13
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
14
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
15
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
16
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
17
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
18
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
reference_id 2256542
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21886
reference_id CVE-2024-21886
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/security/cve/CVE-2024-21886
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-21886
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6qd-r6ua-cfbm
67
url VCID-jbua-ftmv-fygf
vulnerability_id VCID-jbua-ftmv-fygf
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
reference_id
reference_type
scores
url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8098.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8098
reference_id
reference_type
scores
0
value 0.0101
scoring_system epss
scoring_elements 0.77294
published_at 2026-05-14T12:55:00Z
1
value 0.0101
scoring_system epss
scoring_elements 0.77036
published_at 2026-04-01T12:55:00Z
2
value 0.0101
scoring_system epss
scoring_elements 0.77041
published_at 2026-04-02T12:55:00Z
3
value 0.0101
scoring_system epss
scoring_elements 0.7707
published_at 2026-04-04T12:55:00Z
4
value 0.0101
scoring_system epss
scoring_elements 0.77052
published_at 2026-04-07T12:55:00Z
5
value 0.0101
scoring_system epss
scoring_elements 0.77084
published_at 2026-04-08T12:55:00Z
6
value 0.0101
scoring_system epss
scoring_elements 0.77094
published_at 2026-04-09T12:55:00Z
7
value 0.0101
scoring_system epss
scoring_elements 0.77121
published_at 2026-04-11T12:55:00Z
8
value 0.0101
scoring_system epss
scoring_elements 0.77101
published_at 2026-04-12T12:55:00Z
9
value 0.0101
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-13T12:55:00Z
10
value 0.0101
scoring_system epss
scoring_elements 0.77137
published_at 2026-04-16T12:55:00Z
11
value 0.0101
scoring_system epss
scoring_elements 0.77139
published_at 2026-04-18T12:55:00Z
12
value 0.0101
scoring_system epss
scoring_elements 0.7713
published_at 2026-04-21T12:55:00Z
13
value 0.0101
scoring_system epss
scoring_elements 0.77164
published_at 2026-04-24T12:55:00Z
14
value 0.0101
scoring_system epss
scoring_elements 0.77171
published_at 2026-04-26T12:55:00Z
15
value 0.0101
scoring_system epss
scoring_elements 0.77185
published_at 2026-04-29T12:55:00Z
16
value 0.0101
scoring_system epss
scoring_elements 0.77191
published_at 2026-05-05T12:55:00Z
17
value 0.0101
scoring_system epss
scoring_elements 0.77221
published_at 2026-05-07T12:55:00Z
18
value 0.0101
scoring_system epss
scoring_elements 0.77242
published_at 2026-05-09T12:55:00Z
19
value 0.0101
scoring_system epss
scoring_elements 0.7723
published_at 2026-05-11T12:55:00Z
20
value 0.0101
scoring_system epss
scoring_elements 0.77247
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8098
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
16
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
17
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
18
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71606
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71606
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168707
reference_id 1168707
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168707
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8098
reference_id CVE-2014-8098
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8098
30
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
31
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
32
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
33
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
34
reference_url https://usn.ubuntu.com/2438-1/
reference_id USN-2438-1
reference_type
scores
url https://usn.ubuntu.com/2438-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8098
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jbua-ftmv-fygf
68
url VCID-jrx7-pbf3-h3at
vulnerability_id VCID-jrx7-pbf3-h3at
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
reference_id
reference_type
scores
0
value 0.00937
scoring_system epss
scoring_elements 0.7639
published_at 2026-05-14T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
8
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
9
value 0.01112
scoring_system epss
scoring_elements 0.78297
published_at 2026-05-09T12:55:00Z
10
value 0.01112
scoring_system epss
scoring_elements 0.7828
published_at 2026-05-07T12:55:00Z
11
value 0.01112
scoring_system epss
scoring_elements 0.78254
published_at 2026-05-05T12:55:00Z
12
value 0.01112
scoring_system epss
scoring_elements 0.78309
published_at 2026-05-12T12:55:00Z
13
value 0.01112
scoring_system epss
scoring_elements 0.78292
published_at 2026-05-11T12:55:00Z
14
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
15
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
16
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
17
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
18
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
19
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
reference_id 2151756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46341
reference_id CVE-2022-46341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://access.redhat.com/security/cve/CVE-2022-46341
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-46341
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at
69
url VCID-juet-bb4m-hkhq
vulnerability_id VCID-juet-bb4m-hkhq
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17773
published_at 2026-05-14T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17696
published_at 2026-05-09T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17657
published_at 2026-05-11T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17693
published_at 2026-05-12T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17991
published_at 2026-04-02T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18045
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17745
published_at 2026-04-07T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17833
published_at 2026-04-08T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17895
published_at 2026-04-09T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.1791
published_at 2026-04-11T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17866
published_at 2026-04-12T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17817
published_at 2026-04-13T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-16T12:55:00Z
13
value 0.00057
scoring_system epss
scoring_elements 0.17769
published_at 2026-04-18T12:55:00Z
14
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-21T12:55:00Z
15
value 0.00057
scoring_system epss
scoring_elements 0.17716
published_at 2026-04-24T12:55:00Z
16
value 0.00057
scoring_system epss
scoring_elements 0.17692
published_at 2026-04-26T12:55:00Z
17
value 0.00057
scoring_system epss
scoring_elements 0.17648
published_at 2026-04-29T12:55:00Z
18
value 0.00057
scoring_system epss
scoring_elements 0.17505
published_at 2026-05-05T12:55:00Z
19
value 0.00057
scoring_system epss
scoring_elements 0.17597
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
reference_id 1086244
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
reference_id 1086245
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
reference_id 2317233
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2024-9632
reference_id CVE-2024-9632
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/security/cve/CVE-2024-9632
28
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
29
reference_url https://access.redhat.com/errata/RHSA-2024:10090
reference_id RHSA-2024:10090
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:10090
30
reference_url https://access.redhat.com/errata/RHSA-2024:8798
reference_id RHSA-2024:8798
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:8798
31
reference_url https://access.redhat.com/errata/RHSA-2024:9540
reference_id RHSA-2024:9540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9540
32
reference_url https://access.redhat.com/errata/RHSA-2024:9579
reference_id RHSA-2024:9579
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9579
33
reference_url https://access.redhat.com/errata/RHSA-2024:9601
reference_id RHSA-2024:9601
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9601
34
reference_url https://access.redhat.com/errata/RHSA-2024:9690
reference_id RHSA-2024:9690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9690
35
reference_url https://access.redhat.com/errata/RHSA-2024:9816
reference_id RHSA-2024:9816
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9816
36
reference_url https://access.redhat.com/errata/RHSA-2024:9818
reference_id RHSA-2024:9818
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9818
37
reference_url https://access.redhat.com/errata/RHSA-2024:9819
reference_id RHSA-2024:9819
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9819
38
reference_url https://access.redhat.com/errata/RHSA-2024:9820
reference_id RHSA-2024:9820
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9820
39
reference_url https://access.redhat.com/errata/RHSA-2024:9901
reference_id RHSA-2024:9901
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9901
40
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:12751
41
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7163
42
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7165
43
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7458
44
reference_url https://usn.ubuntu.com/7085-1/
reference_id USN-7085-1
reference_type
scores
url https://usn.ubuntu.com/7085-1/
45
reference_url https://usn.ubuntu.com/7085-2/
reference_id USN-7085-2
reference_type
scores
url https://usn.ubuntu.com/7085-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u14?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u14%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.13-3.1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.13-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.13-3.1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-9632
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juet-bb4m-hkhq
70
url VCID-jvgv-d94j-mqa1
vulnerability_id VCID-jvgv-d94j-mqa1
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12178
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75383
published_at 2026-05-14T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75236
published_at 2026-04-16T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75242
published_at 2026-04-18T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75233
published_at 2026-04-21T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-24T12:55:00Z
5
value 0.00871
scoring_system epss
scoring_elements 0.75273
published_at 2026-04-26T12:55:00Z
6
value 0.00871
scoring_system epss
scoring_elements 0.75277
published_at 2026-04-29T12:55:00Z
7
value 0.00871
scoring_system epss
scoring_elements 0.75286
published_at 2026-05-05T12:55:00Z
8
value 0.00871
scoring_system epss
scoring_elements 0.75313
published_at 2026-05-07T12:55:00Z
9
value 0.00871
scoring_system epss
scoring_elements 0.75338
published_at 2026-05-09T12:55:00Z
10
value 0.00871
scoring_system epss
scoring_elements 0.75319
published_at 2026-05-11T12:55:00Z
11
value 0.00871
scoring_system epss
scoring_elements 0.75327
published_at 2026-05-12T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
14
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
15
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
16
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
17
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
18
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
19
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509219
reference_id 1509219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509219
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12178
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvgv-d94j-mqa1
71
url VCID-m2hp-k4c4-m3db
vulnerability_id VCID-m2hp-k4c4-m3db
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3550
reference_id
reference_type
scores
0
value 0.00346
scoring_system epss
scoring_elements 0.57298
published_at 2026-05-14T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61403
published_at 2026-04-02T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-04T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-07T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61448
published_at 2026-04-08T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61464
published_at 2026-04-09T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61485
published_at 2026-04-11T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61471
published_at 2026-04-12T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61453
published_at 2026-04-13T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-16T12:55:00Z
10
value 0.00412
scoring_system epss
scoring_elements 0.61496
published_at 2026-04-18T12:55:00Z
11
value 0.00412
scoring_system epss
scoring_elements 0.6148
published_at 2026-04-21T12:55:00Z
12
value 0.00412
scoring_system epss
scoring_elements 0.61467
published_at 2026-04-24T12:55:00Z
13
value 0.00412
scoring_system epss
scoring_elements 0.61484
published_at 2026-04-26T12:55:00Z
14
value 0.00412
scoring_system epss
scoring_elements 0.61479
published_at 2026-04-29T12:55:00Z
15
value 0.00412
scoring_system epss
scoring_elements 0.6143
published_at 2026-05-05T12:55:00Z
16
value 0.00412
scoring_system epss
scoring_elements 0.61478
published_at 2026-05-07T12:55:00Z
17
value 0.00412
scoring_system epss
scoring_elements 0.61539
published_at 2026-05-09T12:55:00Z
18
value 0.00412
scoring_system epss
scoring_elements 0.61501
published_at 2026-05-11T12:55:00Z
19
value 0.00412
scoring_system epss
scoring_elements 0.61528
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140698
reference_id 2140698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140698
6
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
7
reference_url https://access.redhat.com/errata/RHSA-2022:8491
reference_id RHSA-2022:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8491
8
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
9
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
10
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
11
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
12
reference_url https://usn.ubuntu.com/5740-1/
reference_id USN-5740-1
reference_type
scores
url https://usn.ubuntu.com/5740-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.4-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.4-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-3%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-3550
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2hp-k4c4-m3db
72
url VCID-may9-9sdj-cbbd
vulnerability_id VCID-may9-9sdj-cbbd
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49177.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49177
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09301
published_at 2026-04-07T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09325
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09389
published_at 2026-04-04T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09377
published_at 2026-04-08T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09424
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09438
published_at 2026-04-11T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09409
published_at 2026-04-12T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24843
published_at 2026-04-29T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24796
published_at 2026-05-07T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.2472
published_at 2026-05-05T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24858
published_at 2026-05-09T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24784
published_at 2026-05-11T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24803
published_at 2026-05-12T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24881
published_at 2026-05-14T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-13T12:55:00Z
15
value 0.00087
scoring_system epss
scoring_elements 0.24995
published_at 2026-04-16T12:55:00Z
16
value 0.00087
scoring_system epss
scoring_elements 0.24987
published_at 2026-04-18T12:55:00Z
17
value 0.00087
scoring_system epss
scoring_elements 0.2496
published_at 2026-04-21T12:55:00Z
18
value 0.00087
scoring_system epss
scoring_elements 0.24897
published_at 2026-04-24T12:55:00Z
19
value 0.00087
scoring_system epss
scoring_elements 0.24886
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49177
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369955
reference_id 2369955
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369955
5
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d965522c34befa6af
reference_id ab02fb96b1c701c3bb47617d965522c34befa6af
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d965522c34befa6af
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
14
reference_url https://access.redhat.com/security/cve/CVE-2025-49177
reference_id CVE-2025-49177
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/security/cve/CVE-2025-49177
15
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/errata/RHSA-2025:10258
16
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/errata/RHSA-2025:9303
17
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/errata/RHSA-2025:9304
18
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://www.x.org/wiki/Development/Security/
19
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@0?distro=trixie
purl pkg:deb/debian/xorg-server@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@0%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-49177
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-may9-9sdj-cbbd
73
url VCID-mmwp-nchs-6bdh
vulnerability_id VCID-mmwp-nchs-6bdh
summary
Multiple vulnerabilities have been found in X.Org X Server, the
    worst of which may allow authenticated attackers to read from or send
    information to arbitrary X11 clients.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3418
reference_id
reference_type
scores
0
value 0.00497
scoring_system epss
scoring_elements 0.65766
published_at 2026-04-01T12:55:00Z
1
value 0.00497
scoring_system epss
scoring_elements 0.65816
published_at 2026-04-02T12:55:00Z
2
value 0.00497
scoring_system epss
scoring_elements 0.65846
published_at 2026-04-04T12:55:00Z
3
value 0.00497
scoring_system epss
scoring_elements 0.65812
published_at 2026-04-07T12:55:00Z
4
value 0.00497
scoring_system epss
scoring_elements 0.65864
published_at 2026-04-08T12:55:00Z
5
value 0.00497
scoring_system epss
scoring_elements 0.65876
published_at 2026-04-09T12:55:00Z
6
value 0.00497
scoring_system epss
scoring_elements 0.65894
published_at 2026-04-11T12:55:00Z
7
value 0.00497
scoring_system epss
scoring_elements 0.65882
published_at 2026-04-12T12:55:00Z
8
value 0.00497
scoring_system epss
scoring_elements 0.65852
published_at 2026-04-13T12:55:00Z
9
value 0.00497
scoring_system epss
scoring_elements 0.65887
published_at 2026-04-16T12:55:00Z
10
value 0.00497
scoring_system epss
scoring_elements 0.65902
published_at 2026-04-18T12:55:00Z
11
value 0.00497
scoring_system epss
scoring_elements 0.6589
published_at 2026-04-21T12:55:00Z
12
value 0.00497
scoring_system epss
scoring_elements 0.659
published_at 2026-04-24T12:55:00Z
13
value 0.00497
scoring_system epss
scoring_elements 0.65911
published_at 2026-04-26T12:55:00Z
14
value 0.00497
scoring_system epss
scoring_elements 0.65909
published_at 2026-04-29T12:55:00Z
15
value 0.00497
scoring_system epss
scoring_elements 0.65883
published_at 2026-05-05T12:55:00Z
16
value 0.00497
scoring_system epss
scoring_elements 0.65928
published_at 2026-05-07T12:55:00Z
17
value 0.00497
scoring_system epss
scoring_elements 0.65972
published_at 2026-05-09T12:55:00Z
18
value 0.00497
scoring_system epss
scoring_elements 0.65942
published_at 2026-05-11T12:55:00Z
19
value 0.00497
scoring_system epss
scoring_elements 0.65962
published_at 2026-05-12T12:55:00Z
20
value 0.00497
scoring_system epss
scoring_elements 0.66017
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1216020
reference_id 1216020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1216020
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308
reference_id 774308
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774308
5
reference_url https://security.gentoo.org/glsa/201701-64
reference_id GLSA-201701-64
reference_type
scores
url https://security.gentoo.org/glsa/201701-64
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.4-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2015-3418
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmwp-nchs-6bdh
74
url VCID-mwwx-h1zr-x7gh
vulnerability_id VCID-mwwx-h1zr-x7gh
summary
Sean Larsson from iDefense Labs has found multiple vulnerabilities in the
    DBE and Render extensions.
references
0
reference_url http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
reference_id
reference_type
scores
url http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
2
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465
3
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
4
reference_url http://osvdb.org/32086
reference_id
reference_type
scores
url http://osvdb.org/32086
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6103.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6103.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6103
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.1395
published_at 2026-05-14T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.1386
published_at 2026-04-01T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13943
published_at 2026-04-02T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13999
published_at 2026-04-04T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13801
published_at 2026-04-07T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13884
published_at 2026-04-08T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13937
published_at 2026-04-09T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13893
published_at 2026-04-11T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13857
published_at 2026-04-12T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13808
published_at 2026-04-13T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13717
published_at 2026-04-16T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13712
published_at 2026-04-18T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13783
published_at 2026-04-21T12:55:00Z
13
value 0.00045
scoring_system epss
scoring_elements 0.13806
published_at 2026-04-24T12:55:00Z
14
value 0.00045
scoring_system epss
scoring_elements 0.13775
published_at 2026-04-26T12:55:00Z
15
value 0.00045
scoring_system epss
scoring_elements 0.13692
published_at 2026-04-29T12:55:00Z
16
value 0.00045
scoring_system epss
scoring_elements 0.13584
published_at 2026-05-05T12:55:00Z
17
value 0.00045
scoring_system epss
scoring_elements 0.13741
published_at 2026-05-07T12:55:00Z
18
value 0.00045
scoring_system epss
scoring_elements 0.13827
published_at 2026-05-09T12:55:00Z
19
value 0.00045
scoring_system epss
scoring_elements 0.13824
published_at 2026-05-11T12:55:00Z
20
value 0.00045
scoring_system epss
scoring_elements 0.13856
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6103
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103
8
reference_url http://secunia.com/advisories/23633
reference_id
reference_type
scores
url http://secunia.com/advisories/23633
9
reference_url http://secunia.com/advisories/23670
reference_id
reference_type
scores
url http://secunia.com/advisories/23670
10
reference_url http://secunia.com/advisories/23684
reference_id
reference_type
scores
url http://secunia.com/advisories/23684
11
reference_url http://secunia.com/advisories/23689
reference_id
reference_type
scores
url http://secunia.com/advisories/23689
12
reference_url http://secunia.com/advisories/23698
reference_id
reference_type
scores
url http://secunia.com/advisories/23698
13
reference_url http://secunia.com/advisories/23705
reference_id
reference_type
scores
url http://secunia.com/advisories/23705
14
reference_url http://secunia.com/advisories/23758
reference_id
reference_type
scores
url http://secunia.com/advisories/23758
15
reference_url http://secunia.com/advisories/23789
reference_id
reference_type
scores
url http://secunia.com/advisories/23789
16
reference_url http://secunia.com/advisories/23966
reference_id
reference_type
scores
url http://secunia.com/advisories/23966
17
reference_url http://secunia.com/advisories/24168
reference_id
reference_type
scores
url http://secunia.com/advisories/24168
18
reference_url http://secunia.com/advisories/24210
reference_id
reference_type
scores
url http://secunia.com/advisories/24210
19
reference_url http://secunia.com/advisories/24247
reference_id
reference_type
scores
url http://secunia.com/advisories/24247
20
reference_url http://secunia.com/advisories/24401
reference_id
reference_type
scores
url http://secunia.com/advisories/24401
21
reference_url http://secunia.com/advisories/25802
reference_id
reference_type
scores
url http://secunia.com/advisories/25802
22
reference_url http://security.gentoo.org/glsa/glsa-200701-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-25.xml
23
reference_url http://securitytracker.com/id?1017495
reference_id
reference_type
scores
url http://securitytracker.com/id?1017495
24
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31379
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31379
25
reference_url https://issues.rpath.com/browse/RPL-920
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-920
26
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011
28
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
29
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
30
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
31
reference_url https://www.debian.org/security/2007/dsa-1249
reference_id
reference_type
scores
url https://www.debian.org/security/2007/dsa-1249
32
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
33
reference_url http://www.novell.com/linux/security/advisories/2007_08_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_08_x.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2007-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0002.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2007-0003.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0003.html
36
reference_url http://www.securityfocus.com/bid/21968
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21968
37
reference_url http://www.ubuntu.com/usn/usn-403-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-403-1
38
reference_url http://www.vupen.com/english/advisories/2007/0108
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0108
39
reference_url http://www.vupen.com/english/advisories/2007/0109
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0109
40
reference_url http://www.vupen.com/english/advisories/2007/0589
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0589
41
reference_url http://www.vupen.com/english/advisories/2007/0669
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0669
42
reference_url http://www.vupen.com/english/advisories/2007/2233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2233
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618240
reference_id 1618240
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618240
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6103
reference_id CVE-2006-6103
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2006-6103
50
reference_url https://security.gentoo.org/glsa/200701-25
reference_id GLSA-200701-25
reference_type
scores
url https://security.gentoo.org/glsa/200701-25
51
reference_url https://access.redhat.com/errata/RHSA-2007:0002
reference_id RHSA-2007:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0002
52
reference_url https://access.redhat.com/errata/RHSA-2007:0003
reference_id RHSA-2007:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0003
53
reference_url https://usn.ubuntu.com/403-1/
reference_id USN-403-1
reference_type
scores
url https://usn.ubuntu.com/403-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-15%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2006-6103
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwwx-h1zr-x7gh
75
url VCID-n95v-qmcg-6bek
vulnerability_id VCID-n95v-qmcg-6bek
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14347.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14347
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.1844
published_at 2026-04-01T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.1835
published_at 2026-05-14T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18232
published_at 2026-05-11T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.1826
published_at 2026-05-12T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18585
published_at 2026-04-02T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.1864
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18349
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18432
published_at 2026-04-08T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18484
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18437
published_at 2026-04-12T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18386
published_at 2026-04-13T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18329
published_at 2026-04-16T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18343
published_at 2026-04-18T12:55:00Z
13
value 0.00059
scoring_system epss
scoring_elements 0.18369
published_at 2026-04-21T12:55:00Z
14
value 0.00059
scoring_system epss
scoring_elements 0.18269
published_at 2026-04-24T12:55:00Z
15
value 0.00059
scoring_system epss
scoring_elements 0.18255
published_at 2026-04-26T12:55:00Z
16
value 0.00059
scoring_system epss
scoring_elements 0.18216
published_at 2026-04-29T12:55:00Z
17
value 0.00059
scoring_system epss
scoring_elements 0.18078
published_at 2026-05-05T12:55:00Z
18
value 0.00059
scoring_system epss
scoring_elements 0.18166
published_at 2026-05-07T12:55:00Z
19
value 0.00059
scoring_system epss
scoring_elements 0.18267
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14347
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862258
reference_id 1862258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862258
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986
reference_id 968986
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968986
10
reference_url https://security.archlinux.org/AVG-1211
reference_id AVG-1211
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1211
11
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
12
reference_url https://access.redhat.com/errata/RHSA-2020:5408
reference_id RHSA-2020:5408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5408
13
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
14
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
15
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2020-14347
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n95v-qmcg-6bek
76
url VCID-nbdz-scr3-hbhv
vulnerability_id VCID-nbdz-scr3-hbhv
summary
Multiple vulnerabilities have been found in X.Org Server, the worst
    of which could allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12176
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-01T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.7654
published_at 2026-05-14T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76487
published_at 2026-05-09T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.76475
published_at 2026-05-11T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.7649
published_at 2026-05-12T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-02T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-04T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-07T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-08T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76365
published_at 2026-04-13T12:55:00Z
10
value 0.0095
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-11T12:55:00Z
11
value 0.0095
scoring_system epss
scoring_elements 0.76369
published_at 2026-04-12T12:55:00Z
12
value 0.0095
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-16T12:55:00Z
13
value 0.0095
scoring_system epss
scoring_elements 0.76411
published_at 2026-04-18T12:55:00Z
14
value 0.0095
scoring_system epss
scoring_elements 0.76396
published_at 2026-04-21T12:55:00Z
15
value 0.0095
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-24T12:55:00Z
16
value 0.0095
scoring_system epss
scoring_elements 0.76436
published_at 2026-04-26T12:55:00Z
17
value 0.0095
scoring_system epss
scoring_elements 0.7645
published_at 2026-04-29T12:55:00Z
18
value 0.0095
scoring_system epss
scoring_elements 0.76438
published_at 2026-05-05T12:55:00Z
19
value 0.0095
scoring_system epss
scoring_elements 0.76467
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509214
reference_id 1509214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509214
18
reference_url https://security.archlinux.org/ASA-201710-29
reference_id ASA-201710-29
reference_type
scores
url https://security.archlinux.org/ASA-201710-29
19
reference_url https://security.archlinux.org/AVG-443
reference_id AVG-443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-443
20
reference_url https://security.gentoo.org/glsa/201711-05
reference_id GLSA-201711-05
reference_type
scores
url https://security.gentoo.org/glsa/201711-05
21
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12176
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbdz-scr3-hbhv
77
url VCID-njkq-ar3p-9fa8
vulnerability_id VCID-njkq-ar3p-9fa8
summary Xorg: X server Render extension memory corruption
references
0
reference_url http://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
reference_id
reference_type
scores
url http://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1166.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1166
reference_id
reference_type
scores
0
value 0.03655
scoring_system epss
scoring_elements 0.87992
published_at 2026-05-14T12:55:00Z
1
value 0.03655
scoring_system epss
scoring_elements 0.87819
published_at 2026-04-01T12:55:00Z
2
value 0.03655
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-02T12:55:00Z
3
value 0.03655
scoring_system epss
scoring_elements 0.8784
published_at 2026-04-04T12:55:00Z
4
value 0.03655
scoring_system epss
scoring_elements 0.87843
published_at 2026-04-07T12:55:00Z
5
value 0.03655
scoring_system epss
scoring_elements 0.87865
published_at 2026-04-08T12:55:00Z
6
value 0.03655
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-09T12:55:00Z
7
value 0.03655
scoring_system epss
scoring_elements 0.87882
published_at 2026-04-11T12:55:00Z
8
value 0.03655
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-12T12:55:00Z
9
value 0.03655
scoring_system epss
scoring_elements 0.87875
published_at 2026-04-13T12:55:00Z
10
value 0.03655
scoring_system epss
scoring_elements 0.87889
published_at 2026-04-16T12:55:00Z
11
value 0.03655
scoring_system epss
scoring_elements 0.87888
published_at 2026-04-18T12:55:00Z
12
value 0.03655
scoring_system epss
scoring_elements 0.87887
published_at 2026-04-21T12:55:00Z
13
value 0.03655
scoring_system epss
scoring_elements 0.87903
published_at 2026-04-24T12:55:00Z
14
value 0.03655
scoring_system epss
scoring_elements 0.8791
published_at 2026-04-26T12:55:00Z
15
value 0.03655
scoring_system epss
scoring_elements 0.87908
published_at 2026-04-29T12:55:00Z
16
value 0.03655
scoring_system epss
scoring_elements 0.8792
published_at 2026-05-05T12:55:00Z
17
value 0.03655
scoring_system epss
scoring_elements 0.87935
published_at 2026-05-07T12:55:00Z
18
value 0.03655
scoring_system epss
scoring_elements 0.87951
published_at 2026-05-09T12:55:00Z
19
value 0.03655
scoring_system epss
scoring_elements 0.87948
published_at 2026-05-11T12:55:00Z
20
value 0.03655
scoring_system epss
scoring_elements 0.8796
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1166
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495733
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495733
5
reference_url http://secunia.com/advisories/39650
reference_id
reference_type
scores
url http://secunia.com/advisories/39650
6
reference_url http://secunia.com/advisories/39834
reference_id
reference_type
scores
url http://secunia.com/advisories/39834
7
reference_url http://securitytracker.com/id?1023929
reference_id
reference_type
scores
url http://securitytracker.com/id?1023929
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10112
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10112
9
reference_url https://rhn.redhat.com/errata/RHSA-2010-0382.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0382.html
10
reference_url http://www.ubuntu.com/usn/USN-939-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-939-1
11
reference_url http://www.vupen.com/english/advisories/2010/1185
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1185
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=582601
reference_id 582601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=582601
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x.org:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org:7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1166
reference_id CVE-2010-1166
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1166
15
reference_url https://access.redhat.com/errata/RHSA-2010:0382
reference_id RHSA-2010:0382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0382
16
reference_url https://usn.ubuntu.com/939-1/
reference_id USN-939-1
reference_type
scores
url https://usn.ubuntu.com/939-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@0?distro=trixie
purl pkg:deb/debian/xorg-server@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@0%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2010-1166
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njkq-ar3p-9fa8
78
url VCID-nzdk-7j9y-pkgw
vulnerability_id VCID-nzdk-7j9y-pkgw
summary
Multiple vulnerabilities have been discovered in the X.Org X server and
    Xfont library, allowing for a local privilege escalation and arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6428.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6428.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6428
reference_id
reference_type
scores
0
value 0.0335
scoring_system epss
scoring_elements 0.87267
published_at 2026-04-01T12:55:00Z
1
value 0.0335
scoring_system epss
scoring_elements 0.87277
published_at 2026-04-02T12:55:00Z
2
value 0.0335
scoring_system epss
scoring_elements 0.87294
published_at 2026-04-04T12:55:00Z
3
value 0.0335
scoring_system epss
scoring_elements 0.87292
published_at 2026-04-07T12:55:00Z
4
value 0.0335
scoring_system epss
scoring_elements 0.87311
published_at 2026-04-08T12:55:00Z
5
value 0.0335
scoring_system epss
scoring_elements 0.87318
published_at 2026-04-09T12:55:00Z
6
value 0.0335
scoring_system epss
scoring_elements 0.8733
published_at 2026-04-11T12:55:00Z
7
value 0.0335
scoring_system epss
scoring_elements 0.87324
published_at 2026-04-12T12:55:00Z
8
value 0.0335
scoring_system epss
scoring_elements 0.8732
published_at 2026-04-13T12:55:00Z
9
value 0.0335
scoring_system epss
scoring_elements 0.87334
published_at 2026-04-16T12:55:00Z
10
value 0.0335
scoring_system epss
scoring_elements 0.87339
published_at 2026-04-18T12:55:00Z
11
value 0.0335
scoring_system epss
scoring_elements 0.87333
published_at 2026-04-21T12:55:00Z
12
value 0.0335
scoring_system epss
scoring_elements 0.8735
published_at 2026-04-24T12:55:00Z
13
value 0.0335
scoring_system epss
scoring_elements 0.87357
published_at 2026-04-26T12:55:00Z
14
value 0.0335
scoring_system epss
scoring_elements 0.87359
published_at 2026-04-29T12:55:00Z
15
value 0.0335
scoring_system epss
scoring_elements 0.87374
published_at 2026-05-05T12:55:00Z
16
value 0.0335
scoring_system epss
scoring_elements 0.87386
published_at 2026-05-07T12:55:00Z
17
value 0.0335
scoring_system epss
scoring_elements 0.87404
published_at 2026-05-09T12:55:00Z
18
value 0.0335
scoring_system epss
scoring_elements 0.87399
published_at 2026-05-11T12:55:00Z
19
value 0.0335
scoring_system epss
scoring_elements 0.87413
published_at 2026-05-12T12:55:00Z
20
value 0.0335
scoring_system epss
scoring_elements 0.87447
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6428
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=413791
reference_id 413791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=413791
4
reference_url https://security.gentoo.org/glsa/200801-09
reference_id GLSA-200801-09
reference_type
scores
url https://security.gentoo.org/glsa/200801-09
5
reference_url https://access.redhat.com/errata/RHSA-2008:0029
reference_id RHSA-2008:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0029
6
reference_url https://access.redhat.com/errata/RHSA-2008:0030
reference_id RHSA-2008:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0030
7
reference_url https://access.redhat.com/errata/RHSA-2008:0031
reference_id RHSA-2008:0031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0031
8
reference_url https://usn.ubuntu.com/571-1/
reference_id USN-571-1
reference_type
scores
url https://usn.ubuntu.com/571-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-6428
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nzdk-7j9y-pkgw
79
url VCID-p1qr-w7cs-bqcy
vulnerability_id VCID-p1qr-w7cs-bqcy
summary
Sean Larsson from iDefense Labs has found multiple vulnerabilities in the
    DBE and Render extensions.
references
0
reference_url http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
reference_id
reference_type
scores
url http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
2
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=464
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=464
3
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
4
reference_url http://osvdb.org/32085
reference_id
reference_type
scores
url http://osvdb.org/32085
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6102.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6102.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6102
reference_id
reference_type
scores
0
value 0.06429
scoring_system epss
scoring_elements 0.91151
published_at 2026-05-14T12:55:00Z
1
value 0.06429
scoring_system epss
scoring_elements 0.91008
published_at 2026-04-01T12:55:00Z
2
value 0.06429
scoring_system epss
scoring_elements 0.91013
published_at 2026-04-02T12:55:00Z
3
value 0.06429
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-04T12:55:00Z
4
value 0.06429
scoring_system epss
scoring_elements 0.91031
published_at 2026-04-07T12:55:00Z
5
value 0.06429
scoring_system epss
scoring_elements 0.91044
published_at 2026-04-08T12:55:00Z
6
value 0.06429
scoring_system epss
scoring_elements 0.9105
published_at 2026-04-09T12:55:00Z
7
value 0.06429
scoring_system epss
scoring_elements 0.91059
published_at 2026-04-12T12:55:00Z
8
value 0.06429
scoring_system epss
scoring_elements 0.91058
published_at 2026-04-13T12:55:00Z
9
value 0.06429
scoring_system epss
scoring_elements 0.91083
published_at 2026-04-16T12:55:00Z
10
value 0.06429
scoring_system epss
scoring_elements 0.91082
published_at 2026-04-18T12:55:00Z
11
value 0.06429
scoring_system epss
scoring_elements 0.91085
published_at 2026-04-21T12:55:00Z
12
value 0.06429
scoring_system epss
scoring_elements 0.91098
published_at 2026-04-24T12:55:00Z
13
value 0.06429
scoring_system epss
scoring_elements 0.91096
published_at 2026-04-26T12:55:00Z
14
value 0.06429
scoring_system epss
scoring_elements 0.91091
published_at 2026-04-29T12:55:00Z
15
value 0.06429
scoring_system epss
scoring_elements 0.91106
published_at 2026-05-05T12:55:00Z
16
value 0.06429
scoring_system epss
scoring_elements 0.9112
published_at 2026-05-07T12:55:00Z
17
value 0.06429
scoring_system epss
scoring_elements 0.91133
published_at 2026-05-09T12:55:00Z
18
value 0.06429
scoring_system epss
scoring_elements 0.91131
published_at 2026-05-11T12:55:00Z
19
value 0.06429
scoring_system epss
scoring_elements 0.9114
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6102
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102
8
reference_url http://secunia.com/advisories/23633
reference_id
reference_type
scores
url http://secunia.com/advisories/23633
9
reference_url http://secunia.com/advisories/23670
reference_id
reference_type
scores
url http://secunia.com/advisories/23670
10
reference_url http://secunia.com/advisories/23684
reference_id
reference_type
scores
url http://secunia.com/advisories/23684
11
reference_url http://secunia.com/advisories/23689
reference_id
reference_type
scores
url http://secunia.com/advisories/23689
12
reference_url http://secunia.com/advisories/23698
reference_id
reference_type
scores
url http://secunia.com/advisories/23698
13
reference_url http://secunia.com/advisories/23705
reference_id
reference_type
scores
url http://secunia.com/advisories/23705
14
reference_url http://secunia.com/advisories/23758
reference_id
reference_type
scores
url http://secunia.com/advisories/23758
15
reference_url http://secunia.com/advisories/23789
reference_id
reference_type
scores
url http://secunia.com/advisories/23789
16
reference_url http://secunia.com/advisories/23966
reference_id
reference_type
scores
url http://secunia.com/advisories/23966
17
reference_url http://secunia.com/advisories/24168
reference_id
reference_type
scores
url http://secunia.com/advisories/24168
18
reference_url http://secunia.com/advisories/24210
reference_id
reference_type
scores
url http://secunia.com/advisories/24210
19
reference_url http://secunia.com/advisories/24247
reference_id
reference_type
scores
url http://secunia.com/advisories/24247
20
reference_url http://secunia.com/advisories/24401
reference_id
reference_type
scores
url http://secunia.com/advisories/24401
21
reference_url http://secunia.com/advisories/25802
reference_id
reference_type
scores
url http://secunia.com/advisories/25802
22
reference_url http://security.gentoo.org/glsa/glsa-200701-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-25.xml
23
reference_url http://securitytracker.com/id?1017495
reference_id
reference_type
scores
url http://securitytracker.com/id?1017495
24
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31376
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31376
25
reference_url https://issues.rpath.com/browse/RPL-920
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-920
26
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991
28
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
29
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
30
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
31
reference_url https://www.debian.org/security/2007/dsa-1249
reference_id
reference_type
scores
url https://www.debian.org/security/2007/dsa-1249
32
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
33
reference_url http://www.novell.com/linux/security/advisories/2007_08_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_08_x.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2007-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0002.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2007-0003.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0003.html
36
reference_url http://www.securityfocus.com/bid/21968
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21968
37
reference_url http://www.ubuntu.com/usn/usn-403-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-403-1
38
reference_url http://www.vupen.com/english/advisories/2007/0108
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0108
39
reference_url http://www.vupen.com/english/advisories/2007/0109
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0109
40
reference_url http://www.vupen.com/english/advisories/2007/0589
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0589
41
reference_url http://www.vupen.com/english/advisories/2007/0669
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0669
42
reference_url http://www.vupen.com/english/advisories/2007/2233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2233
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618239
reference_id 1618239
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618239
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86_x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:xfree86_x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:xfree86_x_server:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6102
reference_id CVE-2006-6102
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2006-6102
50
reference_url https://security.gentoo.org/glsa/200701-25
reference_id GLSA-200701-25
reference_type
scores
url https://security.gentoo.org/glsa/200701-25
51
reference_url https://access.redhat.com/errata/RHSA-2007:0002
reference_id RHSA-2007:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0002
52
reference_url https://access.redhat.com/errata/RHSA-2007:0003
reference_id RHSA-2007:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0003
53
reference_url https://usn.ubuntu.com/403-1/
reference_id USN-403-1
reference_type
scores
url https://usn.ubuntu.com/403-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.1.1-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-15%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2006-6102
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1qr-w7cs-bqcy
80
url VCID-p1tf-2c6u-tygr
vulnerability_id VCID-p1tf-2c6u-tygr
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.30981
published_at 2026-05-14T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.30975
published_at 2026-05-09T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.30888
published_at 2026-05-11T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.30911
published_at 2026-05-12T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
14
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
15
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
16
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
17
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
18
value 0.00123
scoring_system epss
scoring_elements 0.30901
published_at 2026-05-05T12:55:00Z
19
value 0.00123
scoring_system epss
scoring_elements 0.3097
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
reference_id 2271997
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31080
reference_id CVE-2024-31080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/security/cve/CVE-2024-31080
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-31080
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1tf-2c6u-tygr
81
url VCID-p4ym-jqrt-s7fj
vulnerability_id VCID-p4ym-jqrt-s7fj
summary X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0745
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-01T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39283
published_at 2026-04-02T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39307
published_at 2026-04-04T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39225
published_at 2026-04-07T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39281
published_at 2026-04-08T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39296
published_at 2026-04-09T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.39309
published_at 2026-04-11T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39271
published_at 2026-04-12T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39252
published_at 2026-04-13T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39305
published_at 2026-04-16T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.39276
published_at 2026-04-18T12:55:00Z
11
value 0.00177
scoring_system epss
scoring_elements 0.39187
published_at 2026-04-21T12:55:00Z
12
value 0.00177
scoring_system epss
scoring_elements 0.38975
published_at 2026-04-24T12:55:00Z
13
value 0.00177
scoring_system epss
scoring_elements 0.38957
published_at 2026-04-26T12:55:00Z
14
value 0.00177
scoring_system epss
scoring_elements 0.38875
published_at 2026-04-29T12:55:00Z
15
value 0.00177
scoring_system epss
scoring_elements 0.38752
published_at 2026-05-05T12:55:00Z
16
value 0.00177
scoring_system epss
scoring_elements 0.38824
published_at 2026-05-07T12:55:00Z
17
value 0.00177
scoring_system epss
scoring_elements 0.38841
published_at 2026-05-09T12:55:00Z
18
value 0.00177
scoring_system epss
scoring_elements 0.38751
published_at 2026-05-11T12:55:00Z
19
value 0.00177
scoring_system epss
scoring_elements 0.38773
published_at 2026-05-12T12:55:00Z
20
value 0.00177
scoring_system epss
scoring_elements 0.38846
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0745
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0745
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378465
reference_id 378465
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378465
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1596.txt
reference_id OSVDB-24000;CVE-2006-0745
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1596.txt
fixed_packages
0
url pkg:deb/debian/xorg-server@1:1.0.2-1?distro=trixie
purl pkg:deb/debian/xorg-server@1:1.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@1:1.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2006-0745
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p4ym-jqrt-s7fj
82
url VCID-pcn1-ehd2-g3f7
vulnerability_id VCID-pcn1-ehd2-g3f7
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14346.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14346
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.37956
published_at 2026-04-01T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38138
published_at 2026-04-02T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38162
published_at 2026-04-04T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38032
published_at 2026-04-07T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38082
published_at 2026-04-08T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38091
published_at 2026-04-09T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38109
published_at 2026-04-11T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38072
published_at 2026-04-12T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38048
published_at 2026-04-13T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38093
published_at 2026-04-16T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.38073
published_at 2026-04-18T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.3801
published_at 2026-04-21T12:55:00Z
12
value 0.00169
scoring_system epss
scoring_elements 0.37794
published_at 2026-04-24T12:55:00Z
13
value 0.00169
scoring_system epss
scoring_elements 0.37772
published_at 2026-04-26T12:55:00Z
14
value 0.00169
scoring_system epss
scoring_elements 0.37678
published_at 2026-04-29T12:55:00Z
15
value 0.00169
scoring_system epss
scoring_elements 0.37564
published_at 2026-05-05T12:55:00Z
16
value 0.00169
scoring_system epss
scoring_elements 0.37634
published_at 2026-05-07T12:55:00Z
17
value 0.00169
scoring_system epss
scoring_elements 0.37651
published_at 2026-05-09T12:55:00Z
18
value 0.00169
scoring_system epss
scoring_elements 0.37565
published_at 2026-05-11T12:55:00Z
19
value 0.00169
scoring_system epss
scoring_elements 0.37538
published_at 2026-05-12T12:55:00Z
20
value 0.00169
scoring_system epss
scoring_elements 0.37616
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14346
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862246
reference_id 1862246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862246
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:4910
reference_id RHSA-2020:4910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4910
11
reference_url https://access.redhat.com/errata/RHSA-2020:4953
reference_id RHSA-2020:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4953
12
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
13
reference_url https://usn.ubuntu.com/4488-1/
reference_id USN-4488-1
reference_type
scores
url https://usn.ubuntu.com/4488-1/
14
reference_url https://usn.ubuntu.com/4488-2/
reference_id USN-4488-2
reference_type
scores
url https://usn.ubuntu.com/4488-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.9-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2020-14346
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcn1-ehd2-g3f7
83
url VCID-phkz-t2yr-m7em
vulnerability_id VCID-phkz-t2yr-m7em
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
reference_id
reference_type
scores
0
value 0.03015
scoring_system epss
scoring_elements 0.86664
published_at 2026-05-05T12:55:00Z
1
value 0.03015
scoring_system epss
scoring_elements 0.86682
published_at 2026-05-07T12:55:00Z
2
value 0.03015
scoring_system epss
scoring_elements 0.86698
published_at 2026-05-09T12:55:00Z
3
value 0.03015
scoring_system epss
scoring_elements 0.86693
published_at 2026-05-11T12:55:00Z
4
value 0.03015
scoring_system epss
scoring_elements 0.86642
published_at 2026-04-29T12:55:00Z
5
value 0.03015
scoring_system epss
scoring_elements 0.86643
published_at 2026-04-26T12:55:00Z
6
value 0.03015
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-24T12:55:00Z
7
value 0.03015
scoring_system epss
scoring_elements 0.86616
published_at 2026-04-21T12:55:00Z
8
value 0.03015
scoring_system epss
scoring_elements 0.86704
published_at 2026-05-12T12:55:00Z
9
value 0.03015
scoring_system epss
scoring_elements 0.86736
published_at 2026-05-14T12:55:00Z
10
value 0.03264
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-11T12:55:00Z
11
value 0.03264
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-04T12:55:00Z
12
value 0.03264
scoring_system epss
scoring_elements 0.87115
published_at 2026-04-07T12:55:00Z
13
value 0.03264
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-08T12:55:00Z
14
value 0.03264
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-09T12:55:00Z
15
value 0.03264
scoring_system epss
scoring_elements 0.87105
published_at 2026-04-02T12:55:00Z
16
value 0.03264
scoring_system epss
scoring_elements 0.87151
published_at 2026-04-12T12:55:00Z
17
value 0.03264
scoring_system epss
scoring_elements 0.87146
published_at 2026-04-13T12:55:00Z
18
value 0.03264
scoring_system epss
scoring_elements 0.87163
published_at 2026-04-16T12:55:00Z
19
value 0.03264
scoring_system epss
scoring_elements 0.87167
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
reference_id 2257691
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2023-6816
reference_id CVE-2023-6816
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/security/cve/CVE-2023-6816
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2023-6816
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-phkz-t2yr-m7em
84
url VCID-psr2-gkpa-z7fj
vulnerability_id VCID-psr2-gkpa-z7fj
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14360
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28445
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.27967
published_at 2026-05-14T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.27872
published_at 2026-05-11T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.27893
published_at 2026-05-12T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28538
published_at 2026-04-02T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28581
published_at 2026-04-04T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28382
published_at 2026-04-07T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28448
published_at 2026-04-08T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.2849
published_at 2026-04-09T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28494
published_at 2026-04-11T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28451
published_at 2026-04-12T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28401
published_at 2026-04-13T12:55:00Z
12
value 0.00104
scoring_system epss
scoring_elements 0.28417
published_at 2026-04-16T12:55:00Z
13
value 0.00104
scoring_system epss
scoring_elements 0.28396
published_at 2026-04-18T12:55:00Z
14
value 0.00104
scoring_system epss
scoring_elements 0.28343
published_at 2026-04-21T12:55:00Z
15
value 0.00104
scoring_system epss
scoring_elements 0.28217
published_at 2026-04-24T12:55:00Z
16
value 0.00104
scoring_system epss
scoring_elements 0.28104
published_at 2026-04-26T12:55:00Z
17
value 0.00104
scoring_system epss
scoring_elements 0.28026
published_at 2026-04-29T12:55:00Z
18
value 0.00104
scoring_system epss
scoring_elements 0.27867
published_at 2026-05-05T12:55:00Z
19
value 0.00104
scoring_system epss
scoring_elements 0.27931
published_at 2026-05-07T12:55:00Z
20
value 0.00104
scoring_system epss
scoring_elements 0.27957
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869139
reference_id 1869139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869139
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
reference_id 976216
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
7
reference_url https://security.archlinux.org/ASA-202012-6
reference_id ASA-202012-6
reference_type
scores
url https://security.archlinux.org/ASA-202012-6
8
reference_url https://security.archlinux.org/AVG-1310
reference_id AVG-1310
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1310
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:5408
reference_id RHSA-2020:5408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5408
11
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
12
reference_url https://usn.ubuntu.com/4656-1/
reference_id USN-4656-1
reference_type
scores
url https://usn.ubuntu.com/4656-1/
13
reference_url https://usn.ubuntu.com/4656-2/
reference_id USN-4656-2
reference_type
scores
url https://usn.ubuntu.com/4656-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.10-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.10-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2020-14360
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psr2-gkpa-z7fj
85
url VCID-q8jj-uwq7-qubk
vulnerability_id VCID-q8jj-uwq7-qubk
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2624
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14333
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.1441
published_at 2026-05-14T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14296
published_at 2026-05-09T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14323
published_at 2026-05-12T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-02T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14485
published_at 2026-04-04T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14291
published_at 2026-04-07T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14374
published_at 2026-04-08T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14428
published_at 2026-04-09T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14377
published_at 2026-04-11T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.14337
published_at 2026-04-12T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.14282
published_at 2026-05-11T12:55:00Z
12
value 0.00046
scoring_system epss
scoring_elements 0.14173
published_at 2026-04-16T12:55:00Z
13
value 0.00046
scoring_system epss
scoring_elements 0.1417
published_at 2026-04-18T12:55:00Z
14
value 0.00046
scoring_system epss
scoring_elements 0.14241
published_at 2026-04-21T12:55:00Z
15
value 0.00046
scoring_system epss
scoring_elements 0.14269
published_at 2026-04-24T12:55:00Z
16
value 0.00046
scoring_system epss
scoring_elements 0.14244
published_at 2026-04-26T12:55:00Z
17
value 0.00046
scoring_system epss
scoring_elements 0.14179
published_at 2026-04-29T12:55:00Z
18
value 0.00046
scoring_system epss
scoring_elements 0.14056
published_at 2026-05-05T12:55:00Z
19
value 0.00046
scoring_system epss
scoring_elements 0.14209
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:N/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1424984
reference_id 1424984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1424984
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398
reference_id 856398
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856398
6
reference_url https://security.gentoo.org/glsa/201704-03
reference_id GLSA-201704-03
reference_type
scores
url https://security.gentoo.org/glsa/201704-03
7
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
8
reference_url https://usn.ubuntu.com/3362-1/
reference_id USN-3362-1
reference_type
scores
url https://usn.ubuntu.com/3362-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.2-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.2-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-2624
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8jj-uwq7-qubk
86
url VCID-q8sq-vkr5-2ba5
vulnerability_id VCID-q8sq-vkr5-2ba5
summary
Multiple vulnerabilities have been discovered in the X.Org X server,
    possibly allowing for the remote execution of arbitrary code with root
    privileges.
references
0
reference_url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff
reference_id
reference_type
scores
url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720
2
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
3
reference_url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2008-0504.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0504.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2362.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2362.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2362
reference_id
reference_type
scores
0
value 0.02076
scoring_system epss
scoring_elements 0.84141
published_at 2026-05-14T12:55:00Z
1
value 0.02076
scoring_system epss
scoring_elements 0.83901
published_at 2026-04-01T12:55:00Z
2
value 0.02076
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-02T12:55:00Z
3
value 0.02076
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-04T12:55:00Z
4
value 0.02076
scoring_system epss
scoring_elements 0.83935
published_at 2026-04-07T12:55:00Z
5
value 0.02076
scoring_system epss
scoring_elements 0.83958
published_at 2026-04-08T12:55:00Z
6
value 0.02076
scoring_system epss
scoring_elements 0.83965
published_at 2026-04-09T12:55:00Z
7
value 0.02076
scoring_system epss
scoring_elements 0.8398
published_at 2026-04-11T12:55:00Z
8
value 0.02076
scoring_system epss
scoring_elements 0.83974
published_at 2026-04-12T12:55:00Z
9
value 0.02076
scoring_system epss
scoring_elements 0.8397
published_at 2026-04-13T12:55:00Z
10
value 0.02076
scoring_system epss
scoring_elements 0.83994
published_at 2026-04-16T12:55:00Z
11
value 0.02076
scoring_system epss
scoring_elements 0.83995
published_at 2026-04-18T12:55:00Z
12
value 0.02076
scoring_system epss
scoring_elements 0.83997
published_at 2026-04-21T12:55:00Z
13
value 0.02076
scoring_system epss
scoring_elements 0.84023
published_at 2026-04-24T12:55:00Z
14
value 0.02076
scoring_system epss
scoring_elements 0.8403
published_at 2026-04-26T12:55:00Z
15
value 0.02076
scoring_system epss
scoring_elements 0.84034
published_at 2026-04-29T12:55:00Z
16
value 0.02076
scoring_system epss
scoring_elements 0.84054
published_at 2026-05-05T12:55:00Z
17
value 0.02076
scoring_system epss
scoring_elements 0.84077
published_at 2026-05-07T12:55:00Z
18
value 0.02076
scoring_system epss
scoring_elements 0.84092
published_at 2026-05-09T12:55:00Z
19
value 0.02076
scoring_system epss
scoring_elements 0.84091
published_at 2026-05-11T12:55:00Z
20
value 0.02076
scoring_system epss
scoring_elements 0.84108
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2362
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362
10
reference_url http://secunia.com/advisories/30627
reference_id
reference_type
scores
url http://secunia.com/advisories/30627
11
reference_url http://secunia.com/advisories/30630
reference_id
reference_type
scores
url http://secunia.com/advisories/30630
12
reference_url http://secunia.com/advisories/30637
reference_id
reference_type
scores
url http://secunia.com/advisories/30637
13
reference_url http://secunia.com/advisories/30659
reference_id
reference_type
scores
url http://secunia.com/advisories/30659
14
reference_url http://secunia.com/advisories/30664
reference_id
reference_type
scores
url http://secunia.com/advisories/30664
15
reference_url http://secunia.com/advisories/30666
reference_id
reference_type
scores
url http://secunia.com/advisories/30666
16
reference_url http://secunia.com/advisories/30671
reference_id
reference_type
scores
url http://secunia.com/advisories/30671
17
reference_url http://secunia.com/advisories/30715
reference_id
reference_type
scores
url http://secunia.com/advisories/30715
18
reference_url http://secunia.com/advisories/30772
reference_id
reference_type
scores
url http://secunia.com/advisories/30772
19
reference_url http://secunia.com/advisories/30809
reference_id
reference_type
scores
url http://secunia.com/advisories/30809
20
reference_url http://secunia.com/advisories/30843
reference_id
reference_type
scores
url http://secunia.com/advisories/30843
21
reference_url http://secunia.com/advisories/31025
reference_id
reference_type
scores
url http://secunia.com/advisories/31025
22
reference_url http://secunia.com/advisories/31109
reference_id
reference_type
scores
url http://secunia.com/advisories/31109
23
reference_url http://secunia.com/advisories/32099
reference_id
reference_type
scores
url http://secunia.com/advisories/32099
24
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
25
reference_url http://security.gentoo.org/glsa/glsa-200806-07.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-07.xml
26
reference_url http://securitytracker.com/id?1020245
reference_id
reference_type
scores
url http://securitytracker.com/id?1020245
27
reference_url https://issues.rpath.com/browse/RPL-2607
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2607
28
reference_url https://issues.rpath.com/browse/RPL-2619
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2619
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246
30
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
31
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
32
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
33
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
34
reference_url http://www.debian.org/security/2008/dsa-1595
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1595
35
reference_url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
36
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
37
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
38
reference_url http://www.securityfocus.com/archive/1/493548/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493548/100/0/threaded
39
reference_url http://www.securityfocus.com/archive/1/493550/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493550/100/0/threaded
40
reference_url http://www.securityfocus.com/bid/29670
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29670
41
reference_url http://www.ubuntu.com/usn/usn-616-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-616-1
42
reference_url http://www.vupen.com/english/advisories/2008/1803
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1803
43
reference_url http://www.vupen.com/english/advisories/2008/1833
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1833
44
reference_url http://www.vupen.com/english/advisories/2008/1983/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1983/references
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=448785
reference_id 448785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=448785
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2362
reference_id CVE-2008-2362
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2362
48
reference_url https://security.gentoo.org/glsa/200806-07
reference_id GLSA-200806-07
reference_type
scores
url https://security.gentoo.org/glsa/200806-07
49
reference_url https://access.redhat.com/errata/RHSA-2008:0504
reference_id RHSA-2008:0504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0504
50
reference_url https://usn.ubuntu.com/616-1/
reference_id USN-616-1
reference_type
scores
url https://usn.ubuntu.com/616-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2008-2362
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8sq-vkr5-2ba5
87
url VCID-qh1y-8a6m-c7dv
vulnerability_id VCID-qh1y-8a6m-c7dv
summary
Multiple vulnerabilities have been discovered in the X.Org X server and
    Xfont library, allowing for a local privilege escalation and arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5958.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5958.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5958
reference_id
reference_type
scores
0
value 0.03599
scoring_system epss
scoring_elements 0.87713
published_at 2026-04-01T12:55:00Z
1
value 0.03599
scoring_system epss
scoring_elements 0.87724
published_at 2026-04-02T12:55:00Z
2
value 0.03599
scoring_system epss
scoring_elements 0.87737
published_at 2026-04-04T12:55:00Z
3
value 0.03599
scoring_system epss
scoring_elements 0.87739
published_at 2026-04-07T12:55:00Z
4
value 0.03599
scoring_system epss
scoring_elements 0.8776
published_at 2026-04-08T12:55:00Z
5
value 0.03599
scoring_system epss
scoring_elements 0.87767
published_at 2026-04-09T12:55:00Z
6
value 0.03599
scoring_system epss
scoring_elements 0.87778
published_at 2026-04-11T12:55:00Z
7
value 0.03599
scoring_system epss
scoring_elements 0.87772
published_at 2026-04-12T12:55:00Z
8
value 0.03599
scoring_system epss
scoring_elements 0.87771
published_at 2026-04-13T12:55:00Z
9
value 0.03599
scoring_system epss
scoring_elements 0.87785
published_at 2026-04-16T12:55:00Z
10
value 0.03599
scoring_system epss
scoring_elements 0.87784
published_at 2026-04-18T12:55:00Z
11
value 0.03599
scoring_system epss
scoring_elements 0.87782
published_at 2026-04-21T12:55:00Z
12
value 0.03599
scoring_system epss
scoring_elements 0.87799
published_at 2026-04-24T12:55:00Z
13
value 0.03599
scoring_system epss
scoring_elements 0.87805
published_at 2026-04-26T12:55:00Z
14
value 0.03599
scoring_system epss
scoring_elements 0.87803
published_at 2026-04-29T12:55:00Z
15
value 0.03599
scoring_system epss
scoring_elements 0.87817
published_at 2026-05-05T12:55:00Z
16
value 0.03599
scoring_system epss
scoring_elements 0.87832
published_at 2026-05-07T12:55:00Z
17
value 0.03599
scoring_system epss
scoring_elements 0.8785
published_at 2026-05-09T12:55:00Z
18
value 0.03599
scoring_system epss
scoring_elements 0.87847
published_at 2026-05-11T12:55:00Z
19
value 0.03599
scoring_system epss
scoring_elements 0.8786
published_at 2026-05-12T12:55:00Z
20
value 0.03599
scoring_system epss
scoring_elements 0.87892
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5958
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=391841
reference_id 391841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=391841
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5152.sh
reference_id CVE-2007-5958
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5152.sh
5
reference_url https://security.gentoo.org/glsa/200801-09
reference_id GLSA-200801-09
reference_type
scores
url https://security.gentoo.org/glsa/200801-09
6
reference_url https://access.redhat.com/errata/RHSA-2008:0029
reference_id RHSA-2008:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0029
7
reference_url https://access.redhat.com/errata/RHSA-2008:0030
reference_id RHSA-2008:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0030
8
reference_url https://access.redhat.com/errata/RHSA-2008:0031
reference_id RHSA-2008:0031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0031
9
reference_url https://usn.ubuntu.com/571-1/
reference_id USN-571-1
reference_type
scores
url https://usn.ubuntu.com/571-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-5958
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qh1y-8a6m-c7dv
88
url VCID-qwqu-19wq-1ke8
vulnerability_id VCID-qwqu-19wq-1ke8
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26594
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0809
published_at 2026-05-05T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08293
published_at 2026-05-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08223
published_at 2026-05-07T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
15
value 0.00034
scoring_system epss
scoring_elements 0.10297
published_at 2026-05-14T12:55:00Z
16
value 0.00034
scoring_system epss
scoring_elements 0.102
published_at 2026-05-11T12:55:00Z
17
value 0.00034
scoring_system epss
scoring_elements 0.10239
published_at 2026-05-12T12:55:00Z
18
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
19
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345248
reference_id 2345248
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345248
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26594
reference_id CVE-2025-26594
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/security/cve/CVE-2025-26594
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u15%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u9%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-26594
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqu-19wq-1ke8
89
url VCID-r4u8-s2mv-qfcn
vulnerability_id VCID-r4u8-s2mv-qfcn
summary xvfb-run insecurely displays mcookie value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1573.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1573
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21019
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21173
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21228
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20942
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21022
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21082
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21099
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21056
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20993
published_at 2026-04-18T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20972
published_at 2026-04-21T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20843
published_at 2026-04-24T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.2084
published_at 2026-04-26T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20808
published_at 2026-04-29T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.20711
published_at 2026-05-05T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.20785
published_at 2026-05-07T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.20872
published_at 2026-05-09T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.20846
published_at 2026-05-11T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.20867
published_at 2026-05-12T12:55:00Z
19
value 0.00071
scoring_system epss
scoring_elements 0.21564
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1573
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=499234
reference_id 499234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=499234
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526678
reference_id 526678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526678
5
reference_url https://usn.ubuntu.com/939-1/
reference_id USN-939-1
reference_type
scores
url https://usn.ubuntu.com/939-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.6.1.901-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.6.1.901-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.6.1.901-3%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2009-1573
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4u8-s2mv-qfcn
90
url VCID-s7xs-zcxk-nyc7
vulnerability_id VCID-s7xs-zcxk-nyc7
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49179
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.1778
published_at 2026-04-07T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18079
published_at 2026-04-04T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17986
published_at 2026-04-02T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-08T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-09T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-11T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17899
published_at 2026-04-12T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.357
published_at 2026-04-29T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.35586
published_at 2026-05-05T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.35657
published_at 2026-05-07T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.35677
published_at 2026-05-09T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36051
published_at 2026-04-21T12:55:00Z
12
value 0.00154
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-24T12:55:00Z
13
value 0.00154
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-26T12:55:00Z
14
value 0.00154
scoring_system epss
scoring_elements 0.36079
published_at 2026-04-13T12:55:00Z
15
value 0.00154
scoring_system epss
scoring_elements 0.3612
published_at 2026-04-16T12:55:00Z
16
value 0.00154
scoring_system epss
scoring_elements 0.36105
published_at 2026-04-18T12:55:00Z
17
value 0.00184
scoring_system epss
scoring_elements 0.3972
published_at 2026-05-11T12:55:00Z
18
value 0.00184
scoring_system epss
scoring_elements 0.39744
published_at 2026-05-12T12:55:00Z
19
value 0.00184
scoring_system epss
scoring_elements 0.39816
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369978
reference_id 2369978
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369978
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
reference_id 2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://access.redhat.com/security/cve/CVE-2025-49179
reference_id CVE-2025-49179
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/security/cve/CVE-2025-49179
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://www.x.org/wiki/Development/Security/
60
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
61
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-49179
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s7xs-zcxk-nyc7
91
url VCID-sfgy-e6d6-f3fd
vulnerability_id VCID-sfgy-e6d6-f3fd
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49175
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-07T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24316
published_at 2026-04-04T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-02T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-08T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24214
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.2423
published_at 2026-04-11T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24188
published_at 2026-04-12T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.38909
published_at 2026-04-24T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.38812
published_at 2026-04-29T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.38891
published_at 2026-04-26T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.38687
published_at 2026-05-05T12:55:00Z
11
value 0.00177
scoring_system epss
scoring_elements 0.3876
published_at 2026-05-07T12:55:00Z
12
value 0.00177
scoring_system epss
scoring_elements 0.38774
published_at 2026-05-09T12:55:00Z
13
value 0.00177
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-21T12:55:00Z
14
value 0.00212
scoring_system epss
scoring_elements 0.43498
published_at 2026-05-12T12:55:00Z
15
value 0.00212
scoring_system epss
scoring_elements 0.43562
published_at 2026-05-14T12:55:00Z
16
value 0.00212
scoring_system epss
scoring_elements 0.43468
published_at 2026-05-11T12:55:00Z
17
value 0.00222
scoring_system epss
scoring_elements 0.44852
published_at 2026-04-13T12:55:00Z
18
value 0.00222
scoring_system epss
scoring_elements 0.44904
published_at 2026-04-16T12:55:00Z
19
value 0.00222
scoring_system epss
scoring_elements 0.44898
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee
reference_id 0885e0b26225c90534642fe911632ec0779eebee
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024
reference_id 2024
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369947
reference_id 2369947
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369947
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
31
reference_url https://access.redhat.com/security/cve/CVE-2025-49175
reference_id CVE-2025-49175
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/security/cve/CVE-2025-49175
32
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10258
33
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10342
34
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10343
35
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10344
36
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10346
37
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10347
38
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10348
39
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10349
40
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10350
41
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10351
42
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10352
43
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10355
44
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10356
45
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10360
46
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10370
47
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10374
48
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10375
49
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10376
50
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10377
51
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10378
52
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10381
53
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10410
54
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9303
55
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9304
56
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9305
57
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9306
58
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9392
59
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9964
60
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://www.x.org/wiki/Development/Security/
61
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
62
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.2%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-49175
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sfgy-e6d6-f3fd
92
url VCID-sju7-ms24-wff1
vulnerability_id VCID-sju7-ms24-wff1
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
reference_id
reference_type
scores
url http://nvidia.custhelp.com/app/answers/detail/a_id/3610
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8093.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8093
reference_id
reference_type
scores
0
value 0.01297
scoring_system epss
scoring_elements 0.79891
published_at 2026-05-14T12:55:00Z
1
value 0.01297
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-01T12:55:00Z
2
value 0.01297
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-02T12:55:00Z
3
value 0.01297
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-04T12:55:00Z
4
value 0.01297
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-07T12:55:00Z
5
value 0.01297
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-08T12:55:00Z
6
value 0.01297
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-09T12:55:00Z
7
value 0.01297
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-11T12:55:00Z
8
value 0.01297
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-12T12:55:00Z
9
value 0.01297
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-13T12:55:00Z
10
value 0.01297
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-16T12:55:00Z
11
value 0.01297
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-18T12:55:00Z
12
value 0.01297
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-21T12:55:00Z
13
value 0.01297
scoring_system epss
scoring_elements 0.79763
published_at 2026-04-24T12:55:00Z
14
value 0.01297
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-26T12:55:00Z
15
value 0.01297
scoring_system epss
scoring_elements 0.79785
published_at 2026-04-29T12:55:00Z
16
value 0.01297
scoring_system epss
scoring_elements 0.798
published_at 2026-05-05T12:55:00Z
17
value 0.01297
scoring_system epss
scoring_elements 0.79825
published_at 2026-05-07T12:55:00Z
18
value 0.01297
scoring_system epss
scoring_elements 0.79841
published_at 2026-05-09T12:55:00Z
19
value 0.01297
scoring_system epss
scoring_elements 0.79838
published_at 2026-05-11T12:55:00Z
20
value 0.01297
scoring_system epss
scoring_elements 0.79854
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8093
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
16
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
17
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
18
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71596
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71596
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168688
reference_id 1168688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168688
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8093
reference_id CVE-2014-8093
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8093
29
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
30
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
31
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
32
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8093
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sju7-ms24-wff1
93
url VCID-str7-xe4q-6fek
vulnerability_id VCID-str7-xe4q-6fek
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8099.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8099
reference_id
reference_type
scores
0
value 0.01337
scoring_system epss
scoring_elements 0.80177
published_at 2026-05-14T12:55:00Z
1
value 0.01337
scoring_system epss
scoring_elements 0.79943
published_at 2026-04-01T12:55:00Z
2
value 0.01337
scoring_system epss
scoring_elements 0.7995
published_at 2026-04-02T12:55:00Z
3
value 0.01337
scoring_system epss
scoring_elements 0.79971
published_at 2026-04-04T12:55:00Z
4
value 0.01337
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-07T12:55:00Z
5
value 0.01337
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-08T12:55:00Z
6
value 0.01337
scoring_system epss
scoring_elements 0.79996
published_at 2026-04-09T12:55:00Z
7
value 0.01337
scoring_system epss
scoring_elements 0.80016
published_at 2026-04-11T12:55:00Z
8
value 0.01337
scoring_system epss
scoring_elements 0.8
published_at 2026-04-12T12:55:00Z
9
value 0.01337
scoring_system epss
scoring_elements 0.79992
published_at 2026-04-13T12:55:00Z
10
value 0.01337
scoring_system epss
scoring_elements 0.80021
published_at 2026-04-18T12:55:00Z
11
value 0.01337
scoring_system epss
scoring_elements 0.80022
published_at 2026-04-21T12:55:00Z
12
value 0.01337
scoring_system epss
scoring_elements 0.8005
published_at 2026-04-24T12:55:00Z
13
value 0.01337
scoring_system epss
scoring_elements 0.80055
published_at 2026-04-26T12:55:00Z
14
value 0.01337
scoring_system epss
scoring_elements 0.80071
published_at 2026-04-29T12:55:00Z
15
value 0.01337
scoring_system epss
scoring_elements 0.80084
published_at 2026-05-05T12:55:00Z
16
value 0.01337
scoring_system epss
scoring_elements 0.80107
published_at 2026-05-07T12:55:00Z
17
value 0.01337
scoring_system epss
scoring_elements 0.80122
published_at 2026-05-09T12:55:00Z
18
value 0.01337
scoring_system epss
scoring_elements 0.80119
published_at 2026-05-11T12:55:00Z
19
value 0.01337
scoring_system epss
scoring_elements 0.80135
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8099
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.securityfocus.com/bid/71600
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71600
21
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168710
reference_id 1168710
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168710
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:xfree86:4.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8099
reference_id CVE-2014-8099
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8099
27
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
28
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
29
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
30
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8099
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-str7-xe4q-6fek
94
url VCID-suyj-bttx-gudj
vulnerability_id VCID-suyj-bttx-gudj
summary
Multiple vulnerabilities have been discovered in the X.Org X server and
    Xfont library, allowing for a local privilege escalation and arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5760.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5760
reference_id
reference_type
scores
0
value 0.04445
scoring_system epss
scoring_elements 0.89001
published_at 2026-04-01T12:55:00Z
1
value 0.04445
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-02T12:55:00Z
2
value 0.04445
scoring_system epss
scoring_elements 0.89024
published_at 2026-04-04T12:55:00Z
3
value 0.04445
scoring_system epss
scoring_elements 0.89027
published_at 2026-04-07T12:55:00Z
4
value 0.04445
scoring_system epss
scoring_elements 0.89044
published_at 2026-04-08T12:55:00Z
5
value 0.04445
scoring_system epss
scoring_elements 0.89049
published_at 2026-04-09T12:55:00Z
6
value 0.04445
scoring_system epss
scoring_elements 0.89061
published_at 2026-04-11T12:55:00Z
7
value 0.04445
scoring_system epss
scoring_elements 0.89056
published_at 2026-04-12T12:55:00Z
8
value 0.04445
scoring_system epss
scoring_elements 0.89054
published_at 2026-04-13T12:55:00Z
9
value 0.04445
scoring_system epss
scoring_elements 0.89068
published_at 2026-04-18T12:55:00Z
10
value 0.04445
scoring_system epss
scoring_elements 0.89064
published_at 2026-04-21T12:55:00Z
11
value 0.04445
scoring_system epss
scoring_elements 0.89082
published_at 2026-04-24T12:55:00Z
12
value 0.04445
scoring_system epss
scoring_elements 0.89089
published_at 2026-04-26T12:55:00Z
13
value 0.04445
scoring_system epss
scoring_elements 0.89092
published_at 2026-04-29T12:55:00Z
14
value 0.04445
scoring_system epss
scoring_elements 0.891
published_at 2026-05-05T12:55:00Z
15
value 0.04445
scoring_system epss
scoring_elements 0.89117
published_at 2026-05-07T12:55:00Z
16
value 0.04445
scoring_system epss
scoring_elements 0.89127
published_at 2026-05-09T12:55:00Z
17
value 0.04445
scoring_system epss
scoring_elements 0.89123
published_at 2026-05-11T12:55:00Z
18
value 0.04445
scoring_system epss
scoring_elements 0.89133
published_at 2026-05-12T12:55:00Z
19
value 0.04445
scoring_system epss
scoring_elements 0.89149
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=414031
reference_id 414031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=414031
4
reference_url https://security.gentoo.org/glsa/200801-09
reference_id GLSA-200801-09
reference_type
scores
url https://security.gentoo.org/glsa/200801-09
5
reference_url https://access.redhat.com/errata/RHSA-2008:0030
reference_id RHSA-2008:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0030
6
reference_url https://access.redhat.com/errata/RHSA-2008:0031
reference_id RHSA-2008:0031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0031
7
reference_url https://usn.ubuntu.com/571-1/
reference_id USN-571-1
reference_type
scores
url https://usn.ubuntu.com/571-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-5760
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suyj-bttx-gudj
95
url VCID-sx54-5s5r-ckg2
vulnerability_id VCID-sx54-5s5r-ckg2
summary xorg: xwayland: Use-after-free in Xkb client resource removal
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62230
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01226
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.01958
published_at 2026-05-14T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.01914
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01913
published_at 2026-04-18T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01983
published_at 2026-04-24T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01982
published_at 2026-04-26T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02011
published_at 2026-04-29T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01962
published_at 2026-05-05T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01954
published_at 2026-05-07T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01979
published_at 2026-05-11T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.01952
published_at 2026-05-12T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.0197
published_at 2026-04-09T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-11T12:55:00Z
13
value 0.00013
scoring_system epss
scoring_elements 0.01939
published_at 2026-04-12T12:55:00Z
14
value 0.00013
scoring_system epss
scoring_elements 0.01933
published_at 2026-04-13T12:55:00Z
15
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-08T12:55:00Z
16
value 9e-05
scoring_system epss
scoring_elements 0.0089
published_at 2026-04-02T12:55:00Z
17
value 9e-05
scoring_system epss
scoring_elements 0.00892
published_at 2026-04-04T12:55:00Z
18
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62230
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402653
reference_id 2402653
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402653
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62230
reference_id CVE-2025-62230
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/security/cve/CVE-2025-62230
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u17%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.20-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-62230
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sx54-5s5r-ckg2
96
url VCID-t1cy-srre-nkbp
vulnerability_id VCID-t1cy-srre-nkbp
summary xorg: xmayland: Value overflow in XkbSetCompatMap()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62231
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01226
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.01958
published_at 2026-05-14T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.01914
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01913
published_at 2026-04-18T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01983
published_at 2026-04-24T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01982
published_at 2026-04-26T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02011
published_at 2026-04-29T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01962
published_at 2026-05-05T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01954
published_at 2026-05-07T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01979
published_at 2026-05-11T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.01952
published_at 2026-05-12T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.0197
published_at 2026-04-09T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-11T12:55:00Z
13
value 0.00013
scoring_system epss
scoring_elements 0.01939
published_at 2026-04-12T12:55:00Z
14
value 0.00013
scoring_system epss
scoring_elements 0.01933
published_at 2026-04-13T12:55:00Z
15
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-08T12:55:00Z
16
value 9e-05
scoring_system epss
scoring_elements 0.0089
published_at 2026-04-02T12:55:00Z
17
value 9e-05
scoring_system epss
scoring_elements 0.00892
published_at 2026-04-04T12:55:00Z
18
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402660
reference_id 2402660
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402660
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62231
reference_id CVE-2025-62231
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/security/cve/CVE-2025-62231
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u17?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u17%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.20-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-62231
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1cy-srre-nkbp
97
url VCID-tame-fxrq-qfa7
vulnerability_id VCID-tame-fxrq-qfa7
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8091.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8091
reference_id
reference_type
scores
0
value 0.04839
scoring_system epss
scoring_elements 0.89621
published_at 2026-05-14T12:55:00Z
1
value 0.04839
scoring_system epss
scoring_elements 0.89488
published_at 2026-04-01T12:55:00Z
2
value 0.04839
scoring_system epss
scoring_elements 0.89492
published_at 2026-04-02T12:55:00Z
3
value 0.04839
scoring_system epss
scoring_elements 0.89503
published_at 2026-04-07T12:55:00Z
4
value 0.04839
scoring_system epss
scoring_elements 0.8952
published_at 2026-04-08T12:55:00Z
5
value 0.04839
scoring_system epss
scoring_elements 0.89523
published_at 2026-04-09T12:55:00Z
6
value 0.04839
scoring_system epss
scoring_elements 0.89531
published_at 2026-04-11T12:55:00Z
7
value 0.04839
scoring_system epss
scoring_elements 0.89528
published_at 2026-04-12T12:55:00Z
8
value 0.04839
scoring_system epss
scoring_elements 0.89524
published_at 2026-04-13T12:55:00Z
9
value 0.04839
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-16T12:55:00Z
10
value 0.04839
scoring_system epss
scoring_elements 0.89539
published_at 2026-04-18T12:55:00Z
11
value 0.04839
scoring_system epss
scoring_elements 0.89536
published_at 2026-04-21T12:55:00Z
12
value 0.04839
scoring_system epss
scoring_elements 0.89551
published_at 2026-04-24T12:55:00Z
13
value 0.04839
scoring_system epss
scoring_elements 0.89555
published_at 2026-04-29T12:55:00Z
14
value 0.04839
scoring_system epss
scoring_elements 0.89563
published_at 2026-05-05T12:55:00Z
15
value 0.04839
scoring_system epss
scoring_elements 0.89581
published_at 2026-05-07T12:55:00Z
16
value 0.04839
scoring_system epss
scoring_elements 0.89595
published_at 2026-05-09T12:55:00Z
17
value 0.04839
scoring_system epss
scoring_elements 0.89591
published_at 2026-05-11T12:55:00Z
18
value 0.04839
scoring_system epss
scoring_elements 0.89601
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8091
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71597
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71597
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168680
reference_id 1168680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168680
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8091
reference_id CVE-2014-8091
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8091
28
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
29
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
30
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
31
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
32
reference_url https://usn.ubuntu.com/2438-1/
reference_id USN-2438-1
reference_type
scores
url https://usn.ubuntu.com/2438-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8091
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tame-fxrq-qfa7
98
url VCID-tmht-8fhj-uue1
vulnerability_id VCID-tmht-8fhj-uue1
summary
Multiple vulnerabilities have been reported in libXfont and TightVNC,
    allowing for the execution of arbitrary code with root privileges.
references
0
reference_url http://issues.foresightlinux.org/browse/FL-223
reference_id
reference_type
scores
url http://issues.foresightlinux.org/browse/FL-223
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503
2
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2007-0125.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0125.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1003.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1003.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1003
reference_id
reference_type
scores
0
value 0.08011
scoring_system epss
scoring_elements 0.92177
published_at 2026-05-14T12:55:00Z
1
value 0.08011
scoring_system epss
scoring_elements 0.92071
published_at 2026-04-01T12:55:00Z
2
value 0.08011
scoring_system epss
scoring_elements 0.92078
published_at 2026-04-02T12:55:00Z
3
value 0.08011
scoring_system epss
scoring_elements 0.92085
published_at 2026-04-04T12:55:00Z
4
value 0.08011
scoring_system epss
scoring_elements 0.92091
published_at 2026-04-07T12:55:00Z
5
value 0.08011
scoring_system epss
scoring_elements 0.92102
published_at 2026-04-08T12:55:00Z
6
value 0.08011
scoring_system epss
scoring_elements 0.92105
published_at 2026-04-09T12:55:00Z
7
value 0.08011
scoring_system epss
scoring_elements 0.92109
published_at 2026-04-11T12:55:00Z
8
value 0.08011
scoring_system epss
scoring_elements 0.9211
published_at 2026-04-12T12:55:00Z
9
value 0.08011
scoring_system epss
scoring_elements 0.92106
published_at 2026-04-13T12:55:00Z
10
value 0.08011
scoring_system epss
scoring_elements 0.92117
published_at 2026-04-26T12:55:00Z
11
value 0.08011
scoring_system epss
scoring_elements 0.92114
published_at 2026-04-18T12:55:00Z
12
value 0.08011
scoring_system epss
scoring_elements 0.92113
published_at 2026-04-21T12:55:00Z
13
value 0.08011
scoring_system epss
scoring_elements 0.92115
published_at 2026-04-29T12:55:00Z
14
value 0.08011
scoring_system epss
scoring_elements 0.92124
published_at 2026-05-05T12:55:00Z
15
value 0.08011
scoring_system epss
scoring_elements 0.92138
published_at 2026-05-07T12:55:00Z
16
value 0.08011
scoring_system epss
scoring_elements 0.92146
published_at 2026-05-09T12:55:00Z
17
value 0.08011
scoring_system epss
scoring_elements 0.92149
published_at 2026-05-11T12:55:00Z
18
value 0.08011
scoring_system epss
scoring_elements 0.92157
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1003
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003
8
reference_url http://secunia.com/advisories/24741
reference_id
reference_type
scores
url http://secunia.com/advisories/24741
9
reference_url http://secunia.com/advisories/24745
reference_id
reference_type
scores
url http://secunia.com/advisories/24745
10
reference_url http://secunia.com/advisories/24756
reference_id
reference_type
scores
url http://secunia.com/advisories/24756
11
reference_url http://secunia.com/advisories/24758
reference_id
reference_type
scores
url http://secunia.com/advisories/24758
12
reference_url http://secunia.com/advisories/24765
reference_id
reference_type
scores
url http://secunia.com/advisories/24765
13
reference_url http://secunia.com/advisories/24770
reference_id
reference_type
scores
url http://secunia.com/advisories/24770
14
reference_url http://secunia.com/advisories/24771
reference_id
reference_type
scores
url http://secunia.com/advisories/24771
15
reference_url http://secunia.com/advisories/24772
reference_id
reference_type
scores
url http://secunia.com/advisories/24772
16
reference_url http://secunia.com/advisories/24791
reference_id
reference_type
scores
url http://secunia.com/advisories/24791
17
reference_url http://secunia.com/advisories/25004
reference_id
reference_type
scores
url http://secunia.com/advisories/25004
18
reference_url http://secunia.com/advisories/25006
reference_id
reference_type
scores
url http://secunia.com/advisories/25006
19
reference_url http://secunia.com/advisories/25195
reference_id
reference_type
scores
url http://secunia.com/advisories/25195
20
reference_url http://secunia.com/advisories/25216
reference_id
reference_type
scores
url http://secunia.com/advisories/25216
21
reference_url http://secunia.com/advisories/25305
reference_id
reference_type
scores
url http://secunia.com/advisories/25305
22
reference_url http://secunia.com/advisories/29622
reference_id
reference_type
scores
url http://secunia.com/advisories/29622
23
reference_url http://security.gentoo.org/glsa/glsa-200705-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-10.xml
24
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33424
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33424
25
reference_url https://issues.rpath.com/browse/RPL-1213
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1213
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798
28
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
29
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
30
reference_url http://www.debian.org/security/2007/dsa-1294
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1294
31
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
32
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
33
reference_url http://www.novell.com/linux/security/advisories/2007_27_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_27_x.html
34
reference_url http://www.openbsd.org/errata39.html#021_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata39.html#021_xorg
35
reference_url http://www.openbsd.org/errata40.html#011_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata40.html#011_xorg
36
reference_url http://www.redhat.com/support/errata/RHSA-2007-0126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0126.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2007-0127.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0127.html
38
reference_url http://www.securityfocus.com/archive/1/464686/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464686/100/0/threaded
39
reference_url http://www.securityfocus.com/archive/1/464816/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464816/100/0/threaded
40
reference_url http://www.securityfocus.com/bid/23284
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23284
41
reference_url http://www.securityfocus.com/bid/23300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23300
42
reference_url http://www.securitytracker.com/id?1017857
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017857
43
reference_url http://www.ubuntu.com/usn/usn-448-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-448-1
44
reference_url http://www.vupen.com/english/advisories/2007/1217
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1217
45
reference_url http://www.vupen.com/english/advisories/2007/1548
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1548
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235263
reference_id 235263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235263
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1003
reference_id CVE-2007-1003
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1003
49
reference_url https://security.gentoo.org/glsa/200705-10
reference_id GLSA-200705-10
reference_type
scores
url https://security.gentoo.org/glsa/200705-10
50
reference_url https://access.redhat.com/errata/RHSA-2007:0125
reference_id RHSA-2007:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0125
51
reference_url https://access.redhat.com/errata/RHSA-2007:0126
reference_id RHSA-2007:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0126
52
reference_url https://access.redhat.com/errata/RHSA-2007:0127
reference_id RHSA-2007:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0127
53
reference_url https://usn.ubuntu.com/448-1/
reference_id USN-448-1
reference_type
scores
url https://usn.ubuntu.com/448-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.1.1-21?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.1.1-21?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.1.1-21%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-1003
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmht-8fhj-uue1
99
url VCID-tngq-27px-w7cm
vulnerability_id VCID-tngq-27px-w7cm
summary
A vulnerability in X.Org X Server allows local users to escalate
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14665
reference_id
reference_type
scores
0
value 0.08941
scoring_system epss
scoring_elements 0.92554
published_at 2026-04-01T12:55:00Z
1
value 0.08941
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-16T12:55:00Z
2
value 0.08941
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-26T12:55:00Z
3
value 0.08941
scoring_system epss
scoring_elements 0.92606
published_at 2026-04-29T12:55:00Z
4
value 0.08941
scoring_system epss
scoring_elements 0.92615
published_at 2026-05-05T12:55:00Z
5
value 0.08941
scoring_system epss
scoring_elements 0.92627
published_at 2026-05-07T12:55:00Z
6
value 0.08941
scoring_system epss
scoring_elements 0.92638
published_at 2026-05-09T12:55:00Z
7
value 0.08941
scoring_system epss
scoring_elements 0.9256
published_at 2026-04-02T12:55:00Z
8
value 0.08941
scoring_system epss
scoring_elements 0.92567
published_at 2026-04-04T12:55:00Z
9
value 0.08941
scoring_system epss
scoring_elements 0.92569
published_at 2026-04-07T12:55:00Z
10
value 0.08941
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-08T12:55:00Z
11
value 0.08941
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-09T12:55:00Z
12
value 0.08941
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-13T12:55:00Z
13
value 0.08941
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-12T12:55:00Z
14
value 0.08941
scoring_system epss
scoring_elements 0.92604
published_at 2026-04-18T12:55:00Z
15
value 0.08941
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-21T12:55:00Z
16
value 0.10153
scoring_system epss
scoring_elements 0.93193
published_at 2026-05-14T12:55:00Z
17
value 0.10153
scoring_system epss
scoring_elements 0.93169
published_at 2026-05-11T12:55:00Z
18
value 0.10153
scoring_system epss
scoring_elements 0.93176
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1637761
reference_id 1637761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1637761
5
reference_url https://security.archlinux.org/ASA-201810-15
reference_id ASA-201810-15
reference_type
scores
url https://security.archlinux.org/ASA-201810-15
6
reference_url https://security.archlinux.org/AVG-788
reference_id AVG-788
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-788
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aix/local/45938.pl
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45832.py
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45697.txt
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45908.rb
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45922.sh
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/openbsd/local/45742.sh
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/local/46142.sh
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/47701.rb
15
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/be6cfde92158d2c6716711046536c9f1ca44d958/modules/exploits/multi/local/xorg_x11_suid_server.rb
16
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb
reference_id CVE-2018-14665
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/aix/local/xorg_x11_server.rb
17
reference_url https://twitter.com/hackerfantastic/status/1055517801224396800
reference_id CVE-2018-14665
reference_type exploit
scores
url https://twitter.com/hackerfantastic/status/1055517801224396800
18
reference_url https://security.gentoo.org/glsa/201810-09
reference_id GLSA-201810-09
reference_type
scores
url https://security.gentoo.org/glsa/201810-09
19
reference_url https://access.redhat.com/errata/RHSA-2018:3410
reference_id RHSA-2018:3410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3410
20
reference_url https://usn.ubuntu.com/3802-1/
reference_id USN-3802-1
reference_type
scores
url https://usn.ubuntu.com/3802-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.3-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.3-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2018-14665
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tngq-27px-w7cm
100
url VCID-tp4n-mkmn-y7a6
vulnerability_id VCID-tp4n-mkmn-y7a6
summary
Multiple vulnerabilities in the X.Org X server might allow local
    attackers to disclose information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4029.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4029
reference_id
reference_type
scores
0
value 0.00766
scoring_system epss
scoring_elements 0.73398
published_at 2026-04-01T12:55:00Z
1
value 0.00766
scoring_system epss
scoring_elements 0.73406
published_at 2026-04-02T12:55:00Z
2
value 0.00766
scoring_system epss
scoring_elements 0.73429
published_at 2026-04-04T12:55:00Z
3
value 0.00766
scoring_system epss
scoring_elements 0.73401
published_at 2026-04-07T12:55:00Z
4
value 0.00766
scoring_system epss
scoring_elements 0.73438
published_at 2026-04-08T12:55:00Z
5
value 0.00766
scoring_system epss
scoring_elements 0.73452
published_at 2026-04-09T12:55:00Z
6
value 0.00766
scoring_system epss
scoring_elements 0.73475
published_at 2026-04-11T12:55:00Z
7
value 0.00766
scoring_system epss
scoring_elements 0.73455
published_at 2026-04-12T12:55:00Z
8
value 0.00766
scoring_system epss
scoring_elements 0.73447
published_at 2026-04-13T12:55:00Z
9
value 0.00766
scoring_system epss
scoring_elements 0.7349
published_at 2026-04-16T12:55:00Z
10
value 0.00766
scoring_system epss
scoring_elements 0.73498
published_at 2026-04-18T12:55:00Z
11
value 0.00766
scoring_system epss
scoring_elements 0.73492
published_at 2026-04-21T12:55:00Z
12
value 0.00766
scoring_system epss
scoring_elements 0.73525
published_at 2026-04-24T12:55:00Z
13
value 0.00766
scoring_system epss
scoring_elements 0.73536
published_at 2026-05-11T12:55:00Z
14
value 0.00766
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-29T12:55:00Z
15
value 0.00766
scoring_system epss
scoring_elements 0.73527
published_at 2026-05-05T12:55:00Z
16
value 0.00766
scoring_system epss
scoring_elements 0.73553
published_at 2026-05-07T12:55:00Z
17
value 0.00766
scoring_system epss
scoring_elements 0.73576
published_at 2026-05-09T12:55:00Z
18
value 0.00766
scoring_system epss
scoring_elements 0.73559
published_at 2026-05-12T12:55:00Z
19
value 0.00766
scoring_system epss
scoring_elements 0.73616
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=745024
reference_id 745024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=745024
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18040.c
reference_id CVE-2011-4613;OSVDB-84058;CVE-2011-4029;OSVDB-76669
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18040.c
5
reference_url https://security.gentoo.org/glsa/201110-19
reference_id GLSA-201110-19
reference_type
scores
url https://security.gentoo.org/glsa/201110-19
6
reference_url https://access.redhat.com/errata/RHSA-2012:0939
reference_id RHSA-2012:0939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0939
7
reference_url https://usn.ubuntu.com/1232-1/
reference_id USN-1232-1
reference_type
scores
url https://usn.ubuntu.com/1232-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.11.1.901-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.11.1.901-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.11.1.901-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2011-4029
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tp4n-mkmn-y7a6
101
url VCID-trsp-u7xt-a3ck
vulnerability_id VCID-trsp-u7xt-a3ck
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6377
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59517
published_at 2026-05-14T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.59416
published_at 2026-04-21T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59354
published_at 2026-05-05T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59402
published_at 2026-05-07T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.5946
published_at 2026-05-09T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59419
published_at 2026-05-11T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.59446
published_at 2026-05-12T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.60023
published_at 2026-04-29T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.60018
published_at 2026-04-24T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.60036
published_at 2026-04-26T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61465
published_at 2026-04-18T12:55:00Z
11
value 0.00411
scoring_system epss
scoring_elements 0.61455
published_at 2026-04-11T12:55:00Z
12
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-13T12:55:00Z
13
value 0.00411
scoring_system epss
scoring_elements 0.61461
published_at 2026-04-16T12:55:00Z
14
value 0.00411
scoring_system epss
scoring_elements 0.61441
published_at 2026-04-12T12:55:00Z
15
value 0.00411
scoring_system epss
scoring_elements 0.61374
published_at 2026-04-02T12:55:00Z
16
value 0.00411
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-04T12:55:00Z
17
value 0.00411
scoring_system epss
scoring_elements 0.61372
published_at 2026-04-07T12:55:00Z
18
value 0.00411
scoring_system epss
scoring_elements 0.61418
published_at 2026-04-08T12:55:00Z
19
value 0.00411
scoring_system epss
scoring_elements 0.61434
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253291
reference_id 2253291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253291
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7886
reference_id RHSA-2023:7886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7886
8
reference_url https://access.redhat.com/errata/RHSA-2024:0006
reference_id RHSA-2024:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0006
9
reference_url https://access.redhat.com/errata/RHSA-2024:0009
reference_id RHSA-2024:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0009
10
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
11
reference_url https://access.redhat.com/errata/RHSA-2024:0014
reference_id RHSA-2024:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0014
12
reference_url https://access.redhat.com/errata/RHSA-2024:0015
reference_id RHSA-2024:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0015
13
reference_url https://access.redhat.com/errata/RHSA-2024:0016
reference_id RHSA-2024:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0016
14
reference_url https://access.redhat.com/errata/RHSA-2024:0017
reference_id RHSA-2024:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0017
15
reference_url https://access.redhat.com/errata/RHSA-2024:0018
reference_id RHSA-2024:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0018
16
reference_url https://access.redhat.com/errata/RHSA-2024:0020
reference_id RHSA-2024:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0020
17
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
18
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
19
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
20
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
21
reference_url https://access.redhat.com/errata/RHSA-2025:13998
reference_id RHSA-2025:13998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13998
22
reference_url https://usn.ubuntu.com/6555-1/
reference_id USN-6555-1
reference_type
scores
url https://usn.ubuntu.com/6555-1/
23
reference_url https://usn.ubuntu.com/6555-2/
reference_id USN-6555-2
reference_type
scores
url https://usn.ubuntu.com/6555-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u10%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.10-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.10-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2023-6377
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trsp-u7xt-a3ck
102
url VCID-tz65-cx8m-g3e5
vulnerability_id VCID-tz65-cx8m-g3e5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8103
reference_id
reference_type
scores
0
value 0.01787
scoring_system epss
scoring_elements 0.82925
published_at 2026-05-14T12:55:00Z
1
value 0.01787
scoring_system epss
scoring_elements 0.82669
published_at 2026-04-01T12:55:00Z
2
value 0.01787
scoring_system epss
scoring_elements 0.82685
published_at 2026-04-02T12:55:00Z
3
value 0.01787
scoring_system epss
scoring_elements 0.82699
published_at 2026-04-04T12:55:00Z
4
value 0.01787
scoring_system epss
scoring_elements 0.82695
published_at 2026-04-07T12:55:00Z
5
value 0.01787
scoring_system epss
scoring_elements 0.82721
published_at 2026-04-08T12:55:00Z
6
value 0.01787
scoring_system epss
scoring_elements 0.82728
published_at 2026-04-09T12:55:00Z
7
value 0.01787
scoring_system epss
scoring_elements 0.82744
published_at 2026-04-11T12:55:00Z
8
value 0.01787
scoring_system epss
scoring_elements 0.82739
published_at 2026-04-12T12:55:00Z
9
value 0.01787
scoring_system epss
scoring_elements 0.82735
published_at 2026-04-13T12:55:00Z
10
value 0.01787
scoring_system epss
scoring_elements 0.82774
published_at 2026-04-18T12:55:00Z
11
value 0.01787
scoring_system epss
scoring_elements 0.82778
published_at 2026-04-21T12:55:00Z
12
value 0.01787
scoring_system epss
scoring_elements 0.828
published_at 2026-04-24T12:55:00Z
13
value 0.01787
scoring_system epss
scoring_elements 0.82809
published_at 2026-04-26T12:55:00Z
14
value 0.01787
scoring_system epss
scoring_elements 0.82815
published_at 2026-04-29T12:55:00Z
15
value 0.01787
scoring_system epss
scoring_elements 0.82834
published_at 2026-05-05T12:55:00Z
16
value 0.01787
scoring_system epss
scoring_elements 0.82855
published_at 2026-05-07T12:55:00Z
17
value 0.01787
scoring_system epss
scoring_elements 0.82876
published_at 2026-05-09T12:55:00Z
18
value 0.01787
scoring_system epss
scoring_elements 0.82874
published_at 2026-05-11T12:55:00Z
19
value 0.01787
scoring_system epss
scoring_elements 0.82889
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
3
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
5
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168716
reference_id 1168716
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168716
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8103
reference_id CVE-2014-8103
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8103
23
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
24
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
25
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8103
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tz65-cx8m-g3e5
103
url VCID-un9v-4svv-2baj
vulnerability_id VCID-un9v-4svv-2baj
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20089
published_at 2026-04-02T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20146
published_at 2026-04-04T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19876
published_at 2026-04-07T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-08T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-09T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-11T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19985
published_at 2026-04-12T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19927
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19905
published_at 2026-04-16T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19909
published_at 2026-04-18T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19906
published_at 2026-04-21T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19799
published_at 2026-04-24T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19794
published_at 2026-04-26T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-29T12:55:00Z
14
value 0.00064
scoring_system epss
scoring_elements 0.19674
published_at 2026-05-05T12:55:00Z
15
value 0.00064
scoring_system epss
scoring_elements 0.1975
published_at 2026-05-07T12:55:00Z
16
value 0.00064
scoring_system epss
scoring_elements 0.19835
published_at 2026-05-09T12:55:00Z
17
value 0.00064
scoring_system epss
scoring_elements 0.19796
published_at 2026-05-11T12:55:00Z
18
value 0.00064
scoring_system epss
scoring_elements 0.19824
published_at 2026-05-12T12:55:00Z
19
value 0.00064
scoring_system epss
scoring_elements 0.19911
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
reference_id 2243091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:6802
reference_id RHSA-2023:6802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6802
8
reference_url https://access.redhat.com/errata/RHSA-2023:6808
reference_id RHSA-2023:6808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6808
9
reference_url https://access.redhat.com/errata/RHSA-2023:7373
reference_id RHSA-2023:7373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7373
10
reference_url https://access.redhat.com/errata/RHSA-2023:7388
reference_id RHSA-2023:7388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7388
11
reference_url https://access.redhat.com/errata/RHSA-2023:7405
reference_id RHSA-2023:7405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7405
12
reference_url https://access.redhat.com/errata/RHSA-2023:7428
reference_id RHSA-2023:7428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7428
13
reference_url https://access.redhat.com/errata/RHSA-2023:7436
reference_id RHSA-2023:7436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7436
14
reference_url https://access.redhat.com/errata/RHSA-2023:7526
reference_id RHSA-2023:7526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7526
15
reference_url https://access.redhat.com/errata/RHSA-2023:7533
reference_id RHSA-2023:7533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7533
16
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
17
reference_url https://access.redhat.com/errata/RHSA-2024:0128
reference_id RHSA-2024:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0128
18
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
19
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
20
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
21
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
22
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
23
reference_url https://usn.ubuntu.com/6453-1/
reference_id USN-6453-1
reference_type
scores
url https://usn.ubuntu.com/6453-1/
24
reference_url https://usn.ubuntu.com/6453-2/
reference_id USN-6453-2
reference_type
scores
url https://usn.ubuntu.com/6453-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u8%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.9-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.9-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2023-5367
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un9v-4svv-2baj
104
url VCID-uxsy-k3cg-mkdd
vulnerability_id VCID-uxsy-k3cg-mkdd
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
reference_id
reference_type
scores
0
value 0.00937
scoring_system epss
scoring_elements 0.7639
published_at 2026-05-14T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
9
value 0.01112
scoring_system epss
scoring_elements 0.78254
published_at 2026-05-05T12:55:00Z
10
value 0.01112
scoring_system epss
scoring_elements 0.78309
published_at 2026-05-12T12:55:00Z
11
value 0.01112
scoring_system epss
scoring_elements 0.78292
published_at 2026-05-11T12:55:00Z
12
value 0.01112
scoring_system epss
scoring_elements 0.78297
published_at 2026-05-09T12:55:00Z
13
value 0.01112
scoring_system epss
scoring_elements 0.7828
published_at 2026-05-07T12:55:00Z
14
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
15
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
16
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
17
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
18
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
19
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
reference_id 2151758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46343
reference_id CVE-2022-46343
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://access.redhat.com/security/cve/CVE-2022-46343
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.5-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2022-46343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd
105
url VCID-v2jb-vhek-fkcz
vulnerability_id VCID-v2jb-vhek-fkcz
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31082
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.0965
published_at 2026-04-12T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09729
published_at 2026-04-24T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09695
published_at 2026-04-26T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09653
published_at 2026-04-29T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09565
published_at 2026-05-05T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09732
published_at 2026-05-07T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09799
published_at 2026-05-09T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09769
published_at 2026-05-11T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09587
published_at 2026-04-02T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09639
published_at 2026-04-04T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09548
published_at 2026-04-07T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09622
published_at 2026-04-08T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09671
published_at 2026-04-09T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09683
published_at 2026-04-11T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09635
published_at 2026-04-13T12:55:00Z
15
value 0.00033
scoring_system epss
scoring_elements 0.09526
published_at 2026-04-16T12:55:00Z
16
value 0.00033
scoring_system epss
scoring_elements 0.0953
published_at 2026-04-18T12:55:00Z
17
value 0.00033
scoring_system epss
scoring_elements 0.0968
published_at 2026-04-21T12:55:00Z
18
value 0.00042
scoring_system epss
scoring_elements 0.1265
published_at 2026-05-12T12:55:00Z
19
value 0.00042
scoring_system epss
scoring_elements 0.12715
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2024-April/003497.html
reference_id 003497.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/
url https://lists.x.org/archives/xorg-announce/2024-April/003497.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271999
reference_id 2271999
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271999
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2024-31082
reference_id CVE-2024-31082
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:13:28Z/
url https://access.redhat.com/security/cve/CVE-2024-31082
12
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
13
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u7%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-3%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-31082
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v2jb-vhek-fkcz
106
url VCID-v6yp-dquj-6bhh
vulnerability_id VCID-v6yp-dquj-6bhh
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8097.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8097
reference_id
reference_type
scores
0
value 0.01297
scoring_system epss
scoring_elements 0.79891
published_at 2026-05-14T12:55:00Z
1
value 0.01297
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-01T12:55:00Z
2
value 0.01297
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-02T12:55:00Z
3
value 0.01297
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-04T12:55:00Z
4
value 0.01297
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-07T12:55:00Z
5
value 0.01297
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-08T12:55:00Z
6
value 0.01297
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-09T12:55:00Z
7
value 0.01297
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-11T12:55:00Z
8
value 0.01297
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-12T12:55:00Z
9
value 0.01297
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-13T12:55:00Z
10
value 0.01297
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-16T12:55:00Z
11
value 0.01297
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-18T12:55:00Z
12
value 0.01297
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-21T12:55:00Z
13
value 0.01297
scoring_system epss
scoring_elements 0.79763
published_at 2026-04-24T12:55:00Z
14
value 0.01297
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-26T12:55:00Z
15
value 0.01297
scoring_system epss
scoring_elements 0.79785
published_at 2026-04-29T12:55:00Z
16
value 0.01297
scoring_system epss
scoring_elements 0.798
published_at 2026-05-05T12:55:00Z
17
value 0.01297
scoring_system epss
scoring_elements 0.79825
published_at 2026-05-07T12:55:00Z
18
value 0.01297
scoring_system epss
scoring_elements 0.79841
published_at 2026-05-09T12:55:00Z
19
value 0.01297
scoring_system epss
scoring_elements 0.79838
published_at 2026-05-11T12:55:00Z
20
value 0.01297
scoring_system epss
scoring_elements 0.79854
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71604
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71604
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168705
reference_id 1168705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168705
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8097
reference_id CVE-2014-8097
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8097
28
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
29
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
30
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
31
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8097
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6yp-dquj-6bhh
107
url VCID-v8w1-zu65-c7ac
vulnerability_id VCID-v8w1-zu65-c7ac
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13723.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13723
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33335
published_at 2026-04-01T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33097
published_at 2026-05-14T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.32973
published_at 2026-05-05T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33042
published_at 2026-05-07T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33081
published_at 2026-05-09T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.32992
published_at 2026-05-11T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33017
published_at 2026-05-12T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33473
published_at 2026-04-02T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33505
published_at 2026-04-04T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33346
published_at 2026-04-07T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-08T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33425
published_at 2026-04-09T12:55:00Z
12
value 0.00136
scoring_system epss
scoring_elements 0.33429
published_at 2026-04-11T12:55:00Z
13
value 0.00136
scoring_system epss
scoring_elements 0.33387
published_at 2026-04-12T12:55:00Z
14
value 0.00136
scoring_system epss
scoring_elements 0.33364
published_at 2026-04-13T12:55:00Z
15
value 0.00136
scoring_system epss
scoring_elements 0.33399
published_at 2026-04-16T12:55:00Z
16
value 0.00136
scoring_system epss
scoring_elements 0.33374
published_at 2026-04-18T12:55:00Z
17
value 0.00136
scoring_system epss
scoring_elements 0.33342
published_at 2026-04-21T12:55:00Z
18
value 0.00136
scoring_system epss
scoring_elements 0.33187
published_at 2026-04-24T12:55:00Z
19
value 0.00136
scoring_system epss
scoring_elements 0.3317
published_at 2026-04-26T12:55:00Z
20
value 0.00136
scoring_system epss
scoring_elements 0.3309
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13723
2
reference_url https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
reference_id
reference_type
scores
url https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
19
reference_url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
reference_id
reference_type
scores
url https://lists.x.org/archives/xorg-announce/2017-October/002808.html
20
reference_url http://www.debian.org/security/2017/dsa-4000
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-4000
21
reference_url http://www.openwall.com/lists/oss-security/2017/10/04/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/10/04/10
22
reference_url http://www.securityfocus.com/bid/101253
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101253
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500388
reference_id 1500388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500388
24
reference_url https://security.archlinux.org/ASA-201710-10
reference_id ASA-201710-10
reference_type
scores
url https://security.archlinux.org/ASA-201710-10
25
reference_url https://security.archlinux.org/AVG-432
reference_id AVG-432
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-432
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13723
reference_id CVE-2017-13723
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13723
30
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
31
reference_url https://usn.ubuntu.com/3453-1/
reference_id USN-3453-1
reference_type
scores
url https://usn.ubuntu.com/3453-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.4-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.4-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-13723
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8w1-zu65-c7ac
108
url VCID-v9p1-8sb6-9ufr
vulnerability_id VCID-v9p1-8sb6-9ufr
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.4697
published_at 2026-05-14T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46844
published_at 2026-05-05T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46906
published_at 2026-05-07T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46925
published_at 2026-05-09T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46868
published_at 2026-05-11T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.469
published_at 2026-05-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
13
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
14
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
15
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
16
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
17
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
18
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
reference_id 2256540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21885
reference_id CVE-2024-21885
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/security/cve/CVE-2024-21885
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.11-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2024-21885
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9p1-8sb6-9ufr
109
url VCID-vkq6-6h66-pubm
vulnerability_id VCID-vkq6-6h66-pubm
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8096.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8096
reference_id
reference_type
scores
0
value 0.01014
scoring_system epss
scoring_elements 0.77339
published_at 2026-05-14T12:55:00Z
1
value 0.01014
scoring_system epss
scoring_elements 0.77083
published_at 2026-04-01T12:55:00Z
2
value 0.01014
scoring_system epss
scoring_elements 0.77089
published_at 2026-04-02T12:55:00Z
3
value 0.01014
scoring_system epss
scoring_elements 0.77118
published_at 2026-04-04T12:55:00Z
4
value 0.01014
scoring_system epss
scoring_elements 0.771
published_at 2026-04-07T12:55:00Z
5
value 0.01014
scoring_system epss
scoring_elements 0.77133
published_at 2026-04-08T12:55:00Z
6
value 0.01014
scoring_system epss
scoring_elements 0.77143
published_at 2026-04-09T12:55:00Z
7
value 0.01014
scoring_system epss
scoring_elements 0.7717
published_at 2026-04-11T12:55:00Z
8
value 0.01014
scoring_system epss
scoring_elements 0.77149
published_at 2026-04-12T12:55:00Z
9
value 0.01014
scoring_system epss
scoring_elements 0.77144
published_at 2026-04-13T12:55:00Z
10
value 0.01014
scoring_system epss
scoring_elements 0.77185
published_at 2026-04-16T12:55:00Z
11
value 0.01014
scoring_system epss
scoring_elements 0.77186
published_at 2026-04-18T12:55:00Z
12
value 0.01014
scoring_system epss
scoring_elements 0.77177
published_at 2026-04-21T12:55:00Z
13
value 0.01014
scoring_system epss
scoring_elements 0.77211
published_at 2026-04-24T12:55:00Z
14
value 0.01014
scoring_system epss
scoring_elements 0.77218
published_at 2026-04-26T12:55:00Z
15
value 0.01014
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-29T12:55:00Z
16
value 0.01014
scoring_system epss
scoring_elements 0.77238
published_at 2026-05-05T12:55:00Z
17
value 0.01014
scoring_system epss
scoring_elements 0.77267
published_at 2026-05-07T12:55:00Z
18
value 0.01014
scoring_system epss
scoring_elements 0.77288
published_at 2026-05-09T12:55:00Z
19
value 0.01014
scoring_system epss
scoring_elements 0.77277
published_at 2026-05-11T12:55:00Z
20
value 0.01014
scoring_system epss
scoring_elements 0.77294
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8096
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
21
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
22
reference_url http://www.securityfocus.com/bid/71598
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71598
23
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168700
reference_id 1168700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168700
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8096
reference_id CVE-2014-8096
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8096
30
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
31
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
32
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
33
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8096
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkq6-6h66-pubm
110
url VCID-vtxx-3wd9-x7hz
vulnerability_id VCID-vtxx-3wd9-x7hz
summary
Multiple vulnerabilities have been discovered in the X.Org X server,
    possibly allowing for the remote execution of arbitrary code with root
    privileges.
references
0
reference_url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff
reference_id
reference_type
scores
url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718
2
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
3
reference_url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2008-0502.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0502.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0504.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0504.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2008-0512.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0512.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2360.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2360.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2360
reference_id
reference_type
scores
0
value 0.0192
scoring_system epss
scoring_elements 0.83537
published_at 2026-05-14T12:55:00Z
1
value 0.0192
scoring_system epss
scoring_elements 0.83279
published_at 2026-04-01T12:55:00Z
2
value 0.0192
scoring_system epss
scoring_elements 0.83296
published_at 2026-04-02T12:55:00Z
3
value 0.0192
scoring_system epss
scoring_elements 0.83311
published_at 2026-04-07T12:55:00Z
4
value 0.0192
scoring_system epss
scoring_elements 0.83335
published_at 2026-04-08T12:55:00Z
5
value 0.0192
scoring_system epss
scoring_elements 0.83344
published_at 2026-04-09T12:55:00Z
6
value 0.0192
scoring_system epss
scoring_elements 0.83359
published_at 2026-04-11T12:55:00Z
7
value 0.0192
scoring_system epss
scoring_elements 0.83353
published_at 2026-04-12T12:55:00Z
8
value 0.0192
scoring_system epss
scoring_elements 0.83349
published_at 2026-04-13T12:55:00Z
9
value 0.0192
scoring_system epss
scoring_elements 0.83384
published_at 2026-04-16T12:55:00Z
10
value 0.0192
scoring_system epss
scoring_elements 0.83386
published_at 2026-04-18T12:55:00Z
11
value 0.0192
scoring_system epss
scoring_elements 0.83387
published_at 2026-04-21T12:55:00Z
12
value 0.0192
scoring_system epss
scoring_elements 0.8341
published_at 2026-04-24T12:55:00Z
13
value 0.0192
scoring_system epss
scoring_elements 0.83417
published_at 2026-04-26T12:55:00Z
14
value 0.0192
scoring_system epss
scoring_elements 0.83419
published_at 2026-04-29T12:55:00Z
15
value 0.0192
scoring_system epss
scoring_elements 0.83444
published_at 2026-05-05T12:55:00Z
16
value 0.0192
scoring_system epss
scoring_elements 0.83465
published_at 2026-05-07T12:55:00Z
17
value 0.0192
scoring_system epss
scoring_elements 0.83484
published_at 2026-05-09T12:55:00Z
18
value 0.0192
scoring_system epss
scoring_elements 0.83486
published_at 2026-05-11T12:55:00Z
19
value 0.0192
scoring_system epss
scoring_elements 0.83502
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2360
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360
12
reference_url http://secunia.com/advisories/30627
reference_id
reference_type
scores
url http://secunia.com/advisories/30627
13
reference_url http://secunia.com/advisories/30628
reference_id
reference_type
scores
url http://secunia.com/advisories/30628
14
reference_url http://secunia.com/advisories/30629
reference_id
reference_type
scores
url http://secunia.com/advisories/30629
15
reference_url http://secunia.com/advisories/30630
reference_id
reference_type
scores
url http://secunia.com/advisories/30630
16
reference_url http://secunia.com/advisories/30637
reference_id
reference_type
scores
url http://secunia.com/advisories/30637
17
reference_url http://secunia.com/advisories/30659
reference_id
reference_type
scores
url http://secunia.com/advisories/30659
18
reference_url http://secunia.com/advisories/30664
reference_id
reference_type
scores
url http://secunia.com/advisories/30664
19
reference_url http://secunia.com/advisories/30666
reference_id
reference_type
scores
url http://secunia.com/advisories/30666
20
reference_url http://secunia.com/advisories/30671
reference_id
reference_type
scores
url http://secunia.com/advisories/30671
21
reference_url http://secunia.com/advisories/30715
reference_id
reference_type
scores
url http://secunia.com/advisories/30715
22
reference_url http://secunia.com/advisories/30772
reference_id
reference_type
scores
url http://secunia.com/advisories/30772
23
reference_url http://secunia.com/advisories/30809
reference_id
reference_type
scores
url http://secunia.com/advisories/30809
24
reference_url http://secunia.com/advisories/30843
reference_id
reference_type
scores
url http://secunia.com/advisories/30843
25
reference_url http://secunia.com/advisories/31025
reference_id
reference_type
scores
url http://secunia.com/advisories/31025
26
reference_url http://secunia.com/advisories/31109
reference_id
reference_type
scores
url http://secunia.com/advisories/31109
27
reference_url http://secunia.com/advisories/32099
reference_id
reference_type
scores
url http://secunia.com/advisories/32099
28
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
29
reference_url http://security.gentoo.org/glsa/glsa-200806-07.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-07.xml
30
reference_url http://securitytracker.com/id?1020243
reference_id
reference_type
scores
url http://securitytracker.com/id?1020243
31
reference_url https://issues.rpath.com/browse/RPL-2607
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2607
32
reference_url https://issues.rpath.com/browse/RPL-2619
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2619
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329
34
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
35
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
37
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
38
reference_url http://www.debian.org/security/2008/dsa-1595
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1595
39
reference_url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
41
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
42
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
43
reference_url http://www.redhat.com/support/errata/RHSA-2008-0503.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0503.html
44
reference_url http://www.securityfocus.com/archive/1/493548/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493548/100/0/threaded
45
reference_url http://www.securityfocus.com/archive/1/493550/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493550/100/0/threaded
46
reference_url http://www.ubuntu.com/usn/usn-616-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-616-1
47
reference_url http://www.vupen.com/english/advisories/2008/1803
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1803
48
reference_url http://www.vupen.com/english/advisories/2008/1833
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1833
49
reference_url http://www.vupen.com/english/advisories/2008/1983/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1983/references
50
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=448783
reference_id 448783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=448783
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2360
reference_id CVE-2008-2360
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2360
53
reference_url https://security.gentoo.org/glsa/200806-07
reference_id GLSA-200806-07
reference_type
scores
url https://security.gentoo.org/glsa/200806-07
54
reference_url https://access.redhat.com/errata/RHSA-2008:0502
reference_id RHSA-2008:0502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0502
55
reference_url https://access.redhat.com/errata/RHSA-2008:0503
reference_id RHSA-2008:0503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0503
56
reference_url https://access.redhat.com/errata/RHSA-2008:0504
reference_id RHSA-2008:0504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0504
57
reference_url https://access.redhat.com/errata/RHSA-2008:0512
reference_id RHSA-2008:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0512
58
reference_url https://usn.ubuntu.com/616-1/
reference_id USN-616-1
reference_type
scores
url https://usn.ubuntu.com/616-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2008-2360
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtxx-3wd9-x7hz
111
url VCID-vzmd-vvau-wbf5
vulnerability_id VCID-vzmd-vvau-wbf5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0532.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0532.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8092.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8092
reference_id
reference_type
scores
0
value 0.01293
scoring_system epss
scoring_elements 0.79863
published_at 2026-05-14T12:55:00Z
1
value 0.01293
scoring_system epss
scoring_elements 0.79825
published_at 2026-05-12T12:55:00Z
2
value 0.01293
scoring_system epss
scoring_elements 0.79627
published_at 2026-04-01T12:55:00Z
3
value 0.01293
scoring_system epss
scoring_elements 0.79633
published_at 2026-04-02T12:55:00Z
4
value 0.01293
scoring_system epss
scoring_elements 0.79655
published_at 2026-04-04T12:55:00Z
5
value 0.01293
scoring_system epss
scoring_elements 0.79641
published_at 2026-04-07T12:55:00Z
6
value 0.01293
scoring_system epss
scoring_elements 0.7967
published_at 2026-04-08T12:55:00Z
7
value 0.01293
scoring_system epss
scoring_elements 0.79677
published_at 2026-04-09T12:55:00Z
8
value 0.01293
scoring_system epss
scoring_elements 0.79698
published_at 2026-04-11T12:55:00Z
9
value 0.01293
scoring_system epss
scoring_elements 0.79682
published_at 2026-04-12T12:55:00Z
10
value 0.01293
scoring_system epss
scoring_elements 0.79675
published_at 2026-04-13T12:55:00Z
11
value 0.01293
scoring_system epss
scoring_elements 0.79703
published_at 2026-04-16T12:55:00Z
12
value 0.01293
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-18T12:55:00Z
13
value 0.01293
scoring_system epss
scoring_elements 0.79707
published_at 2026-04-21T12:55:00Z
14
value 0.01293
scoring_system epss
scoring_elements 0.79737
published_at 2026-04-24T12:55:00Z
15
value 0.01293
scoring_system epss
scoring_elements 0.79744
published_at 2026-04-26T12:55:00Z
16
value 0.01293
scoring_system epss
scoring_elements 0.79758
published_at 2026-04-29T12:55:00Z
17
value 0.01293
scoring_system epss
scoring_elements 0.79774
published_at 2026-05-05T12:55:00Z
18
value 0.01293
scoring_system epss
scoring_elements 0.79798
published_at 2026-05-07T12:55:00Z
19
value 0.01293
scoring_system epss
scoring_elements 0.79814
published_at 2026-05-09T12:55:00Z
20
value 0.01293
scoring_system epss
scoring_elements 0.7981
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8092
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
15
reference_url http://secunia.com/advisories/61947
reference_id
reference_type
scores
url http://secunia.com/advisories/61947
16
reference_url http://secunia.com/advisories/62292
reference_id
reference_type
scores
url http://secunia.com/advisories/62292
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2014/dsa-3095
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3095
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:119
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
21
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
23
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
24
reference_url http://www.securityfocus.com/bid/71595
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71595
25
reference_url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168684
reference_id 1168684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168684
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11:1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8092
reference_id CVE-2014-8092
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8092
30
reference_url https://security.gentoo.org/glsa/201504-06
reference_id GLSA-201504-06
reference_type
scores
url https://security.gentoo.org/glsa/201504-06
31
reference_url https://access.redhat.com/errata/RHSA-2014:1982
reference_id RHSA-2014:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1982
32
reference_url https://access.redhat.com/errata/RHSA-2014:1983
reference_id RHSA-2014:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1983
33
reference_url https://usn.ubuntu.com/2436-1/
reference_id USN-2436-1
reference_type
scores
url https://usn.ubuntu.com/2436-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.16.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.16.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2014-8092
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzmd-vvau-wbf5
112
url VCID-wh9v-35ju-vbcb
vulnerability_id VCID-wh9v-35ju-vbcb
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-02T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69854
published_at 2026-04-11T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69792
published_at 2026-04-04T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69768
published_at 2026-04-07T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69816
published_at 2026-04-08T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69831
published_at 2026-04-09T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69839
published_at 2026-04-12T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69824
published_at 2026-04-13T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72341
published_at 2026-04-29T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72292
published_at 2026-04-21T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72336
published_at 2026-04-24T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.72345
published_at 2026-04-26T12:55:00Z
12
value 0.00711
scoring_system epss
scoring_elements 0.72332
published_at 2026-05-05T12:55:00Z
13
value 0.00711
scoring_system epss
scoring_elements 0.72361
published_at 2026-05-07T12:55:00Z
14
value 0.00711
scoring_system epss
scoring_elements 0.72388
published_at 2026-05-09T12:55:00Z
15
value 0.00711
scoring_system epss
scoring_elements 0.72351
published_at 2026-05-11T12:55:00Z
16
value 0.00711
scoring_system epss
scoring_elements 0.72377
published_at 2026-05-12T12:55:00Z
17
value 0.00711
scoring_system epss
scoring_elements 0.72435
published_at 2026-05-14T12:55:00Z
18
value 0.00711
scoring_system epss
scoring_elements 0.72295
published_at 2026-04-16T12:55:00Z
19
value 0.00711
scoring_system epss
scoring_elements 0.72304
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
reference_id 003320.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://lists.x.org/archives/xorg-announce/2023-February/003320.html
5
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
reference_id 0ba6d8c37071131a49790243cdac55392ecf71ec
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
reference_id 1030777
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030777
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
reference_id 2165995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2165995
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:41:52Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://access.redhat.com/errata/RHSA-2023:0622
reference_id RHSA-2023:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0622
10
reference_url https://access.redhat.com/errata/RHSA-2023:0623
reference_id RHSA-2023:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0623
11
reference_url https://access.redhat.com/errata/RHSA-2023:0662
reference_id RHSA-2023:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0662
12
reference_url https://access.redhat.com/errata/RHSA-2023:0663
reference_id RHSA-2023:0663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0663
13
reference_url https://access.redhat.com/errata/RHSA-2023:0664
reference_id RHSA-2023:0664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0664
14
reference_url https://access.redhat.com/errata/RHSA-2023:0665
reference_id RHSA-2023:0665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0665
15
reference_url https://access.redhat.com/errata/RHSA-2023:0671
reference_id RHSA-2023:0671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0671
16
reference_url https://access.redhat.com/errata/RHSA-2023:0675
reference_id RHSA-2023:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0675
17
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
18
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
19
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
20
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
23
reference_url https://usn.ubuntu.com/5846-1/
reference_id USN-5846-1
reference_type
scores
url https://usn.ubuntu.com/5846-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-1%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2023-0494
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh9v-35ju-vbcb
113
url VCID-wjbk-4mjq-ybab
vulnerability_id VCID-wjbk-4mjq-ybab
summary
Multiple vulnerabilities have been found in X.Org Server the worst
    of which could allow a local attacker to replace shared memory segments.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6424
reference_id
reference_type
scores
0
value 0.0684
scoring_system epss
scoring_elements 0.913
published_at 2026-04-01T12:55:00Z
1
value 0.0684
scoring_system epss
scoring_elements 0.91305
published_at 2026-04-02T12:55:00Z
2
value 0.0684
scoring_system epss
scoring_elements 0.91315
published_at 2026-04-04T12:55:00Z
3
value 0.0684
scoring_system epss
scoring_elements 0.91322
published_at 2026-04-07T12:55:00Z
4
value 0.0684
scoring_system epss
scoring_elements 0.91335
published_at 2026-04-08T12:55:00Z
5
value 0.0684
scoring_system epss
scoring_elements 0.9134
published_at 2026-04-09T12:55:00Z
6
value 0.0684
scoring_system epss
scoring_elements 0.91347
published_at 2026-04-11T12:55:00Z
7
value 0.0684
scoring_system epss
scoring_elements 0.9135
published_at 2026-04-13T12:55:00Z
8
value 0.0684
scoring_system epss
scoring_elements 0.91375
published_at 2026-04-21T12:55:00Z
9
value 0.0684
scoring_system epss
scoring_elements 0.91373
published_at 2026-04-18T12:55:00Z
10
value 0.0684
scoring_system epss
scoring_elements 0.91384
published_at 2026-04-24T12:55:00Z
11
value 0.0684
scoring_system epss
scoring_elements 0.91383
published_at 2026-04-26T12:55:00Z
12
value 0.0684
scoring_system epss
scoring_elements 0.91382
published_at 2026-04-29T12:55:00Z
13
value 0.0684
scoring_system epss
scoring_elements 0.91397
published_at 2026-05-05T12:55:00Z
14
value 0.0684
scoring_system epss
scoring_elements 0.91413
published_at 2026-05-07T12:55:00Z
15
value 0.0684
scoring_system epss
scoring_elements 0.91422
published_at 2026-05-09T12:55:00Z
16
value 0.0684
scoring_system epss
scoring_elements 0.91421
published_at 2026-05-11T12:55:00Z
17
value 0.0684
scoring_system epss
scoring_elements 0.9143
published_at 2026-05-12T12:55:00Z
18
value 0.0684
scoring_system epss
scoring_elements 0.91439
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1037984
reference_id 1037984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1037984
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922
reference_id 742922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742922
5
reference_url https://security.gentoo.org/glsa/201701-64
reference_id GLSA-201701-64
reference_type
scores
url https://security.gentoo.org/glsa/201701-64
6
reference_url https://security.gentoo.org/glsa/201710-30
reference_id GLSA-201710-30
reference_type
scores
url https://security.gentoo.org/glsa/201710-30
7
reference_url https://access.redhat.com/errata/RHSA-2013:1868
reference_id RHSA-2013:1868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1868
8
reference_url https://usn.ubuntu.com/2500-1/
reference_id USN-2500-1
reference_type
scores
url https://usn.ubuntu.com/2500-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.14.2.901-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.14.2.901-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.14.2.901-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2013-6424
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjbk-4mjq-ybab
114
url VCID-wp8b-r6p1-7kcf
vulnerability_id VCID-wp8b-r6p1-7kcf
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23801
published_at 2026-04-02T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23618
published_at 2026-04-07T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23662
published_at 2026-04-16T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.2365
published_at 2026-04-13T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23706
published_at 2026-04-12T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-11T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23734
published_at 2026-04-09T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-08T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-04T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.25811
published_at 2026-05-07T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25753
published_at 2026-05-05T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.2586
published_at 2026-04-29T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25908
published_at 2026-04-26T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25912
published_at 2026-04-24T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25972
published_at 2026-04-21T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.26007
published_at 2026-04-18T12:55:00Z
16
value 0.00093
scoring_system epss
scoring_elements 0.25888
published_at 2026-05-14T12:55:00Z
17
value 0.00093
scoring_system epss
scoring_elements 0.25812
published_at 2026-05-12T12:55:00Z
18
value 0.00093
scoring_system epss
scoring_elements 0.25795
published_at 2026-05-11T12:55:00Z
19
value 0.00093
scoring_system epss
scoring_elements 0.25869
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2023/03/29/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://www.openwall.com/lists/oss-security/2023/03/29/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
reference_id 2180288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180288
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
reference_id 26ef545b3502f61ca722a7a3373507e88ef64110
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
reference_id BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/
8
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://security.gentoo.org/glsa/202305-30
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
reference_id H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
reference_id MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
reference_id NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
reference_id PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
reference_id QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/
14
reference_url https://access.redhat.com/errata/RHSA-2023:1548
reference_id RHSA-2023:1548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1548
15
reference_url https://access.redhat.com/errata/RHSA-2023:1549
reference_id RHSA-2023:1549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1549
16
reference_url https://access.redhat.com/errata/RHSA-2023:1551
reference_id RHSA-2023:1551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1551
17
reference_url https://access.redhat.com/errata/RHSA-2023:1592
reference_id RHSA-2023:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1592
18
reference_url https://access.redhat.com/errata/RHSA-2023:1594
reference_id RHSA-2023:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1594
19
reference_url https://access.redhat.com/errata/RHSA-2023:1598
reference_id RHSA-2023:1598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1598
20
reference_url https://access.redhat.com/errata/RHSA-2023:1599
reference_id RHSA-2023:1599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1599
21
reference_url https://access.redhat.com/errata/RHSA-2023:1600
reference_id RHSA-2023:1600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1600
22
reference_url https://access.redhat.com/errata/RHSA-2023:6340
reference_id RHSA-2023:6340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6340
23
reference_url https://access.redhat.com/errata/RHSA-2023:6341
reference_id RHSA-2023:6341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6341
24
reference_url https://access.redhat.com/errata/RHSA-2023:6916
reference_id RHSA-2023:6916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6916
25
reference_url https://access.redhat.com/errata/RHSA-2023:6917
reference_id RHSA-2023:6917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6917
26
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
reference_id SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
reference_id SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:42:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/
29
reference_url https://usn.ubuntu.com/5986-1/
reference_id USN-5986-1
reference_type
scores
url https://usn.ubuntu.com/5986-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u6?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u6%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-2%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2023-1393
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wp8b-r6p1-7kcf
115
url VCID-wq4p-h17p-fyf4
vulnerability_id VCID-wq4p-h17p-fyf4
summary
Multiple vulnerabilities have been found in X.org X Server, the
    worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25712
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33044
published_at 2026-04-01T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.32804
published_at 2026-05-14T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.327
published_at 2026-05-11T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32725
published_at 2026-05-12T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33174
published_at 2026-04-02T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-04T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33038
published_at 2026-04-07T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.33081
published_at 2026-04-08T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.33114
published_at 2026-04-09T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.33116
published_at 2026-04-11T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.33078
published_at 2026-04-12T12:55:00Z
11
value 0.00134
scoring_system epss
scoring_elements 0.33054
published_at 2026-04-13T12:55:00Z
12
value 0.00134
scoring_system epss
scoring_elements 0.33096
published_at 2026-04-16T12:55:00Z
13
value 0.00134
scoring_system epss
scoring_elements 0.33072
published_at 2026-04-18T12:55:00Z
14
value 0.00134
scoring_system epss
scoring_elements 0.33035
published_at 2026-04-21T12:55:00Z
15
value 0.00134
scoring_system epss
scoring_elements 0.32888
published_at 2026-04-24T12:55:00Z
16
value 0.00134
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-26T12:55:00Z
17
value 0.00134
scoring_system epss
scoring_elements 0.32796
published_at 2026-04-29T12:55:00Z
18
value 0.00134
scoring_system epss
scoring_elements 0.32684
published_at 2026-05-05T12:55:00Z
19
value 0.00134
scoring_system epss
scoring_elements 0.32752
published_at 2026-05-07T12:55:00Z
20
value 0.00134
scoring_system epss
scoring_elements 0.32791
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25712
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1887276
reference_id 1887276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1887276
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
reference_id 976216
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976216
7
reference_url https://security.archlinux.org/ASA-202012-6
reference_id ASA-202012-6
reference_type
scores
url https://security.archlinux.org/ASA-202012-6
8
reference_url https://security.archlinux.org/AVG-1310
reference_id AVG-1310
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1310
9
reference_url https://security.gentoo.org/glsa/202012-01
reference_id GLSA-202012-01
reference_type
scores
url https://security.gentoo.org/glsa/202012-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:5408
reference_id RHSA-2020:5408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5408
11
reference_url https://access.redhat.com/errata/RHSA-2021:1804
reference_id RHSA-2021:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1804
12
reference_url https://usn.ubuntu.com/4656-1/
reference_id USN-4656-1
reference_type
scores
url https://usn.ubuntu.com/4656-1/
13
reference_url https://usn.ubuntu.com/4656-2/
reference_id USN-4656-2
reference_type
scores
url https://usn.ubuntu.com/4656-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.10-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.10-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2020-25712
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wq4p-h17p-fyf4
116
url VCID-wyuw-13t9-rbg1
vulnerability_id VCID-wyuw-13t9-rbg1
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49176
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-07T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24316
published_at 2026-04-04T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-02T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-08T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24214
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.2423
published_at 2026-04-11T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24188
published_at 2026-04-12T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44745
published_at 2026-04-24T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44675
published_at 2026-04-29T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44752
published_at 2026-04-26T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44561
published_at 2026-05-05T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44631
published_at 2026-05-07T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44646
published_at 2026-05-09T12:55:00Z
13
value 0.00222
scoring_system epss
scoring_elements 0.44904
published_at 2026-04-16T12:55:00Z
14
value 0.00222
scoring_system epss
scoring_elements 0.44898
published_at 2026-04-18T12:55:00Z
15
value 0.00222
scoring_system epss
scoring_elements 0.44832
published_at 2026-04-21T12:55:00Z
16
value 0.00222
scoring_system epss
scoring_elements 0.44852
published_at 2026-04-13T12:55:00Z
17
value 0.00267
scoring_system epss
scoring_elements 0.50077
published_at 2026-05-11T12:55:00Z
18
value 0.00267
scoring_system epss
scoring_elements 0.50106
published_at 2026-05-12T12:55:00Z
19
value 0.00267
scoring_system epss
scoring_elements 0.50182
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9
reference_id 03731b326a80b582e48d939fe62cb1e2b10400d9
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073
reference_id 1108073
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369954
reference_id 2369954
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369954
8
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
reference_id 4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
32
reference_url https://access.redhat.com/security/cve/CVE-2025-49176
reference_id CVE-2025-49176
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/security/cve/CVE-2025-49176
33
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10258
34
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10342
35
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10343
36
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10344
37
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10346
38
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10347
39
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10348
40
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10349
41
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10350
42
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10351
43
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10352
44
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10355
45
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10356
46
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10360
47
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10370
48
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10374
49
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10375
50
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10376
51
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10377
52
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10378
53
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10381
54
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10410
55
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9303
56
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9304
57
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9305
58
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9306
59
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9392
60
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9964
61
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://www.x.org/wiki/Development/Security/
62
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
63
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u16%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2025-49176
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyuw-13t9-rbg1
117
url VCID-x3p6-a59z-ebf3
vulnerability_id VCID-x3p6-a59z-ebf3
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
reference_id
reference_type
scores
0
value 0.00958
scoring_system epss
scoring_elements 0.76482
published_at 2026-04-21T12:55:00Z
1
value 0.01113
scoring_system epss
scoring_elements 0.78351
published_at 2026-05-14T12:55:00Z
2
value 0.01113
scoring_system epss
scoring_elements 0.78257
published_at 2026-05-05T12:55:00Z
3
value 0.01113
scoring_system epss
scoring_elements 0.78283
published_at 2026-05-07T12:55:00Z
4
value 0.01113
scoring_system epss
scoring_elements 0.783
published_at 2026-05-09T12:55:00Z
5
value 0.01113
scoring_system epss
scoring_elements 0.78295
published_at 2026-05-11T12:55:00Z
6
value 0.01113
scoring_system epss
scoring_elements 0.78312
published_at 2026-05-12T12:55:00Z
7
value 0.01143
scoring_system epss
scoring_elements 0.78499
published_at 2026-04-24T12:55:00Z
8
value 0.01143
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-26T12:55:00Z
9
value 0.01143
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-29T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-02T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.78996
published_at 2026-04-18T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.78971
published_at 2026-04-13T12:55:00Z
13
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-16T12:55:00Z
14
value 0.01208
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-12T12:55:00Z
15
value 0.01208
scoring_system epss
scoring_elements 0.78958
published_at 2026-04-04T12:55:00Z
16
value 0.01208
scoring_system epss
scoring_elements 0.78941
published_at 2026-04-07T12:55:00Z
17
value 0.01208
scoring_system epss
scoring_elements 0.78966
published_at 2026-04-08T12:55:00Z
18
value 0.01208
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
reference_id 2253298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7886
reference_id RHSA-2023:7886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7886
8
reference_url https://access.redhat.com/errata/RHSA-2024:0006
reference_id RHSA-2024:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0006
9
reference_url https://access.redhat.com/errata/RHSA-2024:0009
reference_id RHSA-2024:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0009
10
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
11
reference_url https://access.redhat.com/errata/RHSA-2024:0014
reference_id RHSA-2024:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0014
12
reference_url https://access.redhat.com/errata/RHSA-2024:0015
reference_id RHSA-2024:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0015
13
reference_url https://access.redhat.com/errata/RHSA-2024:0016
reference_id RHSA-2024:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0016
14
reference_url https://access.redhat.com/errata/RHSA-2024:0017
reference_id RHSA-2024:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0017
15
reference_url https://access.redhat.com/errata/RHSA-2024:0018
reference_id RHSA-2024:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0018
16
reference_url https://access.redhat.com/errata/RHSA-2024:0020
reference_id RHSA-2024:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0020
17
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
18
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
19
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
20
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/6555-1/
reference_id USN-6555-1
reference_type
scores
url https://usn.ubuntu.com/6555-1/
23
reference_url https://usn.ubuntu.com/6555-2/
reference_id USN-6555-2
reference_type
scores
url https://usn.ubuntu.com/6555-2/
24
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u9%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.10-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.10-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
7
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2023-6478
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3p6-a59z-ebf3
118
url VCID-xk4b-12p1-ckam
vulnerability_id VCID-xk4b-12p1-ckam
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12186
reference_id
reference_type
scores
0
value 0.00754
scoring_system epss
scoring_elements 0.73175
published_at 2026-04-01T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.73402
published_at 2026-05-14T12:55:00Z
2
value 0.00754
scoring_system epss
scoring_elements 0.73321
published_at 2026-05-11T12:55:00Z
3
value 0.00754
scoring_system epss
scoring_elements 0.73345
published_at 2026-05-12T12:55:00Z
4
value 0.00754
scoring_system epss
scoring_elements 0.73185
published_at 2026-04-02T12:55:00Z
5
value 0.00754
scoring_system epss
scoring_elements 0.73205
published_at 2026-04-04T12:55:00Z
6
value 0.00754
scoring_system epss
scoring_elements 0.73179
published_at 2026-04-07T12:55:00Z
7
value 0.00754
scoring_system epss
scoring_elements 0.73216
published_at 2026-04-08T12:55:00Z
8
value 0.00754
scoring_system epss
scoring_elements 0.73229
published_at 2026-04-09T12:55:00Z
9
value 0.00754
scoring_system epss
scoring_elements 0.73254
published_at 2026-04-11T12:55:00Z
10
value 0.00754
scoring_system epss
scoring_elements 0.73235
published_at 2026-04-12T12:55:00Z
11
value 0.00754
scoring_system epss
scoring_elements 0.73228
published_at 2026-04-13T12:55:00Z
12
value 0.00754
scoring_system epss
scoring_elements 0.73271
published_at 2026-04-16T12:55:00Z
13
value 0.00754
scoring_system epss
scoring_elements 0.7328
published_at 2026-04-18T12:55:00Z
14
value 0.00754
scoring_system epss
scoring_elements 0.73273
published_at 2026-04-21T12:55:00Z
15
value 0.00754
scoring_system epss
scoring_elements 0.73307
published_at 2026-04-24T12:55:00Z
16
value 0.00754
scoring_system epss
scoring_elements 0.7332
published_at 2026-04-26T12:55:00Z
17
value 0.00754
scoring_system epss
scoring_elements 0.73319
published_at 2026-04-29T12:55:00Z
18
value 0.00754
scoring_system epss
scoring_elements 0.73313
published_at 2026-05-05T12:55:00Z
19
value 0.00754
scoring_system epss
scoring_elements 0.73339
published_at 2026-05-07T12:55:00Z
20
value 0.00754
scoring_system epss
scoring_elements 0.73362
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1509216
reference_id 1509216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1509216
18
reference_url https://usn.ubuntu.com/3456-1/
reference_id USN-3456-1
reference_type
scores
url https://usn.ubuntu.com/3456-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.19.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.19.5-1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2017-12186
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xk4b-12p1-ckam
119
url VCID-y69n-tgmv-nubg
vulnerability_id VCID-y69n-tgmv-nubg
summary
Multiple vulnerabilities have been discovered in the X.Org X server,
    possibly allowing for the remote execution of arbitrary code with root
    privileges.
references
0
reference_url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff
reference_id
reference_type
scores
url ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719
2
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
3
reference_url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2008-0502.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0502.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0504.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0504.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2361.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2361.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2361
reference_id
reference_type
scores
0
value 0.01482
scoring_system epss
scoring_elements 0.81192
published_at 2026-05-14T12:55:00Z
1
value 0.01482
scoring_system epss
scoring_elements 0.80942
published_at 2026-04-01T12:55:00Z
2
value 0.01482
scoring_system epss
scoring_elements 0.80951
published_at 2026-04-02T12:55:00Z
3
value 0.01482
scoring_system epss
scoring_elements 0.80973
published_at 2026-04-04T12:55:00Z
4
value 0.01482
scoring_system epss
scoring_elements 0.80972
published_at 2026-04-07T12:55:00Z
5
value 0.01482
scoring_system epss
scoring_elements 0.80999
published_at 2026-04-08T12:55:00Z
6
value 0.01482
scoring_system epss
scoring_elements 0.81006
published_at 2026-04-09T12:55:00Z
7
value 0.01482
scoring_system epss
scoring_elements 0.81023
published_at 2026-04-11T12:55:00Z
8
value 0.01482
scoring_system epss
scoring_elements 0.81009
published_at 2026-04-12T12:55:00Z
9
value 0.01482
scoring_system epss
scoring_elements 0.81002
published_at 2026-04-13T12:55:00Z
10
value 0.01482
scoring_system epss
scoring_elements 0.81039
published_at 2026-04-21T12:55:00Z
11
value 0.01482
scoring_system epss
scoring_elements 0.81041
published_at 2026-04-18T12:55:00Z
12
value 0.01482
scoring_system epss
scoring_elements 0.81061
published_at 2026-04-24T12:55:00Z
13
value 0.01482
scoring_system epss
scoring_elements 0.8107
published_at 2026-04-26T12:55:00Z
14
value 0.01482
scoring_system epss
scoring_elements 0.81077
published_at 2026-04-29T12:55:00Z
15
value 0.01482
scoring_system epss
scoring_elements 0.81093
published_at 2026-05-05T12:55:00Z
16
value 0.01482
scoring_system epss
scoring_elements 0.81114
published_at 2026-05-07T12:55:00Z
17
value 0.01482
scoring_system epss
scoring_elements 0.81137
published_at 2026-05-09T12:55:00Z
18
value 0.01482
scoring_system epss
scoring_elements 0.81133
published_at 2026-05-11T12:55:00Z
19
value 0.01482
scoring_system epss
scoring_elements 0.81151
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2361
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361
11
reference_url http://secunia.com/advisories/30627
reference_id
reference_type
scores
url http://secunia.com/advisories/30627
12
reference_url http://secunia.com/advisories/30629
reference_id
reference_type
scores
url http://secunia.com/advisories/30629
13
reference_url http://secunia.com/advisories/30630
reference_id
reference_type
scores
url http://secunia.com/advisories/30630
14
reference_url http://secunia.com/advisories/30637
reference_id
reference_type
scores
url http://secunia.com/advisories/30637
15
reference_url http://secunia.com/advisories/30659
reference_id
reference_type
scores
url http://secunia.com/advisories/30659
16
reference_url http://secunia.com/advisories/30664
reference_id
reference_type
scores
url http://secunia.com/advisories/30664
17
reference_url http://secunia.com/advisories/30666
reference_id
reference_type
scores
url http://secunia.com/advisories/30666
18
reference_url http://secunia.com/advisories/30671
reference_id
reference_type
scores
url http://secunia.com/advisories/30671
19
reference_url http://secunia.com/advisories/30715
reference_id
reference_type
scores
url http://secunia.com/advisories/30715
20
reference_url http://secunia.com/advisories/30772
reference_id
reference_type
scores
url http://secunia.com/advisories/30772
21
reference_url http://secunia.com/advisories/30809
reference_id
reference_type
scores
url http://secunia.com/advisories/30809
22
reference_url http://secunia.com/advisories/30843
reference_id
reference_type
scores
url http://secunia.com/advisories/30843
23
reference_url http://secunia.com/advisories/31025
reference_id
reference_type
scores
url http://secunia.com/advisories/31025
24
reference_url http://secunia.com/advisories/31109
reference_id
reference_type
scores
url http://secunia.com/advisories/31109
25
reference_url http://secunia.com/advisories/32099
reference_id
reference_type
scores
url http://secunia.com/advisories/32099
26
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
27
reference_url http://security.gentoo.org/glsa/glsa-200806-07.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-07.xml
28
reference_url http://securitytracker.com/id?1020244
reference_id
reference_type
scores
url http://securitytracker.com/id?1020244
29
reference_url https://issues.rpath.com/browse/RPL-2607
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2607
30
reference_url https://issues.rpath.com/browse/RPL-2619
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2619
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
33
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
34
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
35
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
36
reference_url http://www.debian.org/security/2008/dsa-1595
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1595
37
reference_url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
38
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
39
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
41
reference_url http://www.redhat.com/support/errata/RHSA-2008-0503.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0503.html
42
reference_url http://www.securityfocus.com/archive/1/493548/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493548/100/0/threaded
43
reference_url http://www.securityfocus.com/archive/1/493550/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493550/100/0/threaded
44
reference_url http://www.securityfocus.com/bid/29665
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29665
45
reference_url http://www.ubuntu.com/usn/usn-616-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-616-1
46
reference_url http://www.vupen.com/english/advisories/2008/1803
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1803
47
reference_url http://www.vupen.com/english/advisories/2008/1833
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1833
48
reference_url http://www.vupen.com/english/advisories/2008/1983/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1983/references
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=448784
reference_id 448784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=448784
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xorg:x11:r7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2361
reference_id CVE-2008-2361
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2361
52
reference_url https://security.gentoo.org/glsa/200806-07
reference_id GLSA-200806-07
reference_type
scores
url https://security.gentoo.org/glsa/200806-07
53
reference_url https://access.redhat.com/errata/RHSA-2008:0502
reference_id RHSA-2008:0502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0502
54
reference_url https://access.redhat.com/errata/RHSA-2008:0503
reference_id RHSA-2008:0503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0503
55
reference_url https://access.redhat.com/errata/RHSA-2008:0504
reference_id RHSA-2008:0504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0504
56
reference_url https://usn.ubuntu.com/616-1/
reference_id USN-616-1
reference_type
scores
url https://usn.ubuntu.com/616-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080517-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2008-2361
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y69n-tgmv-nubg
120
url VCID-y9c9-2teb-ryfb
vulnerability_id VCID-y9c9-2teb-ryfb
summary
Multiple vulnerabilities in the X.Org X server might allow local
    attackers to disclose information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4028.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4028
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.278
published_at 2026-04-11T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27851
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27892
published_at 2026-04-04T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27683
published_at 2026-04-18T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27751
published_at 2026-04-08T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27794
published_at 2026-04-09T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27758
published_at 2026-04-12T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.277
published_at 2026-04-13T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.2771
published_at 2026-04-16T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27645
published_at 2026-04-21T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27593
published_at 2026-04-24T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27486
published_at 2026-04-26T12:55:00Z
12
value 0.001
scoring_system epss
scoring_elements 0.27413
published_at 2026-04-29T12:55:00Z
13
value 0.001
scoring_system epss
scoring_elements 0.27243
published_at 2026-05-05T12:55:00Z
14
value 0.001
scoring_system epss
scoring_elements 0.27305
published_at 2026-05-07T12:55:00Z
15
value 0.001
scoring_system epss
scoring_elements 0.27326
published_at 2026-05-09T12:55:00Z
16
value 0.001
scoring_system epss
scoring_elements 0.27242
published_at 2026-05-11T12:55:00Z
17
value 0.001
scoring_system epss
scoring_elements 0.27256
published_at 2026-05-12T12:55:00Z
18
value 0.001
scoring_system epss
scoring_elements 0.27333
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=745755
reference_id 745755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=745755
4
reference_url https://security.gentoo.org/glsa/201110-19
reference_id GLSA-201110-19
reference_type
scores
url https://security.gentoo.org/glsa/201110-19
5
reference_url https://access.redhat.com/errata/RHSA-2012:0303
reference_id RHSA-2012:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0303
6
reference_url https://access.redhat.com/errata/RHSA-2012:0939
reference_id RHSA-2012:0939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0939
7
reference_url https://usn.ubuntu.com/1232-1/
reference_id USN-1232-1
reference_type
scores
url https://usn.ubuntu.com/1232-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.11.1.901-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.11.1.901-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.11.1.901-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2011-4028
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9c9-2teb-ryfb
121
url VCID-zbbj-umsp-nyfy
vulnerability_id VCID-zbbj-umsp-nyfy
summary
Multiple vulnerabilities have been discovered in the X.Org X server and
    Xfont library, allowing for a local privilege escalation and arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6427.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6427
reference_id
reference_type
scores
0
value 0.0424
scoring_system epss
scoring_elements 0.88732
published_at 2026-04-01T12:55:00Z
1
value 0.0424
scoring_system epss
scoring_elements 0.88741
published_at 2026-04-02T12:55:00Z
2
value 0.0424
scoring_system epss
scoring_elements 0.88758
published_at 2026-04-04T12:55:00Z
3
value 0.0424
scoring_system epss
scoring_elements 0.8876
published_at 2026-04-07T12:55:00Z
4
value 0.0424
scoring_system epss
scoring_elements 0.88777
published_at 2026-04-08T12:55:00Z
5
value 0.0424
scoring_system epss
scoring_elements 0.88782
published_at 2026-04-09T12:55:00Z
6
value 0.0424
scoring_system epss
scoring_elements 0.88794
published_at 2026-04-11T12:55:00Z
7
value 0.0424
scoring_system epss
scoring_elements 0.88788
published_at 2026-04-12T12:55:00Z
8
value 0.0424
scoring_system epss
scoring_elements 0.88789
published_at 2026-04-13T12:55:00Z
9
value 0.0424
scoring_system epss
scoring_elements 0.88802
published_at 2026-04-16T12:55:00Z
10
value 0.0424
scoring_system epss
scoring_elements 0.888
published_at 2026-04-18T12:55:00Z
11
value 0.0424
scoring_system epss
scoring_elements 0.88798
published_at 2026-04-21T12:55:00Z
12
value 0.0424
scoring_system epss
scoring_elements 0.88814
published_at 2026-04-24T12:55:00Z
13
value 0.0424
scoring_system epss
scoring_elements 0.8882
published_at 2026-04-26T12:55:00Z
14
value 0.0424
scoring_system epss
scoring_elements 0.88819
published_at 2026-04-29T12:55:00Z
15
value 0.0424
scoring_system epss
scoring_elements 0.88828
published_at 2026-05-05T12:55:00Z
16
value 0.0424
scoring_system epss
scoring_elements 0.88845
published_at 2026-05-07T12:55:00Z
17
value 0.0424
scoring_system epss
scoring_elements 0.88857
published_at 2026-05-09T12:55:00Z
18
value 0.0424
scoring_system epss
scoring_elements 0.88853
published_at 2026-05-11T12:55:00Z
19
value 0.0424
scoring_system epss
scoring_elements 0.88863
published_at 2026-05-12T12:55:00Z
20
value 0.0424
scoring_system epss
scoring_elements 0.88881
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=413811
reference_id 413811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=413811
4
reference_url https://security.gentoo.org/glsa/200801-09
reference_id GLSA-200801-09
reference_type
scores
url https://security.gentoo.org/glsa/200801-09
5
reference_url https://access.redhat.com/errata/RHSA-2008:0029
reference_id RHSA-2008:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0029
6
reference_url https://access.redhat.com/errata/RHSA-2008:0030
reference_id RHSA-2008:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0030
7
reference_url https://access.redhat.com/errata/RHSA-2008:0031
reference_id RHSA-2008:0031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0031
8
reference_url https://usn.ubuntu.com/571-1/
reference_id USN-571-1
reference_type
scores
url https://usn.ubuntu.com/571-1/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.4.1~git20080105-2%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2007-6427
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbbj-umsp-nyfy
122
url VCID-zhdy-8stm-q3ey
vulnerability_id VCID-zhdy-8stm-q3ey
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4009.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4009
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25795
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25583
published_at 2026-05-14T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25565
published_at 2026-05-09T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25487
published_at 2026-05-11T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25504
published_at 2026-05-12T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25855
published_at 2026-04-02T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25898
published_at 2026-04-04T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.2567
published_at 2026-04-07T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25741
published_at 2026-04-08T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25789
published_at 2026-04-09T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25799
published_at 2026-04-11T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25757
published_at 2026-04-12T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25699
published_at 2026-04-13T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25702
published_at 2026-04-16T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25684
published_at 2026-04-18T12:55:00Z
15
value 0.00091
scoring_system epss
scoring_elements 0.25661
published_at 2026-04-21T12:55:00Z
16
value 0.00091
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-24T12:55:00Z
17
value 0.00091
scoring_system epss
scoring_elements 0.25596
published_at 2026-04-26T12:55:00Z
18
value 0.00091
scoring_system epss
scoring_elements 0.25546
published_at 2026-04-29T12:55:00Z
19
value 0.00091
scoring_system epss
scoring_elements 0.25436
published_at 2026-05-05T12:55:00Z
20
value 0.00091
scoring_system epss
scoring_elements 0.25503
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4009
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026072
reference_id 2026072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026072
8
reference_url https://security.archlinux.org/AVG-2636
reference_id AVG-2636
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2636
9
reference_url https://security.archlinux.org/AVG-2640
reference_id AVG-2640
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2640
10
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
11
reference_url https://access.redhat.com/errata/RHSA-2022:0003
reference_id RHSA-2022:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0003
12
reference_url https://access.redhat.com/errata/RHSA-2022:1917
reference_id RHSA-2022:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1917
13
reference_url https://usn.ubuntu.com/5193-1/
reference_id USN-5193-1
reference_type
scores
url https://usn.ubuntu.com/5193-1/
14
reference_url https://usn.ubuntu.com/5193-2/
reference_id USN-5193-2
reference_type
scores
url https://usn.ubuntu.com/5193-2/
15
reference_url https://usn.ubuntu.com/5193-3/
reference_id USN-5193-3
reference_type
scores
url https://usn.ubuntu.com/5193-3/
fixed_packages
0
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-cxf3-8znp-rbbz
3
vulnerability VCID-hxab-xyu1-xkgc
4
vulnerability VCID-pa9n-ntq3-jqaz
5
vulnerability VCID-wzer-jnm3-rqa8
6
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
purl pkg:deb/debian/xorg-server@2:1.20.13-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.13-3%3Fdistro=trixie
3
url pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-b14x-4mtq-5fc7
2
vulnerability VCID-hxab-xyu1-xkgc
3
vulnerability VCID-pa9n-ntq3-jqaz
4
vulnerability VCID-wzer-jnm3-rqa8
5
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie
4
url pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie
6
url pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
purl pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie
aliases CVE-2021-4009
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhdy-8stm-q3ey
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie