Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xwayland@2:22.1.9-1
Typedeb
Namespacedebian
Namexwayland
Version2:22.1.9-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:24.1.10-1
Latest_non_vulnerable_version2:24.1.11-1
Affected_by_vulnerabilities
0
url VCID-1pcv-f5h3-9fe9
vulnerability_id VCID-1pcv-f5h3-9fe9
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26595
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345257
reference_id 2345257
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345257
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26595
reference_id CVE-2025-26595
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/security/cve/CVE-2025-26595
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:05:05Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26595
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pcv-f5h3-9fe9
1
url VCID-2cp3-p3yx-17be
vulnerability_id VCID-2cp3-p3yx-17be
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49180
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.1778
published_at 2026-04-07T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17986
published_at 2026-04-02T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18079
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-08T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-09T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-11T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17899
published_at 2026-04-12T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.30915
published_at 2026-04-29T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31292
published_at 2026-04-21T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.3112
published_at 2026-04-24T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.30998
published_at 2026-04-26T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36105
published_at 2026-04-18T12:55:00Z
12
value 0.00154
scoring_system epss
scoring_elements 0.36079
published_at 2026-04-13T12:55:00Z
13
value 0.00154
scoring_system epss
scoring_elements 0.3612
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369981
reference_id 2369981
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369981
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6
reference_id 3c3a4b767b16174d3213055947ea7f4f88e10ec6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/3c3a4b767b16174d3213055947ea7f4f88e10ec6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://access.redhat.com/security/cve/CVE-2025-49180
reference_id CVE-2025-49180
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/security/cve/CVE-2025-49180
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:36:37Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
60
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-49180
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cp3-p3yx-17be
2
url VCID-2vrb-n6cc-c7bc
vulnerability_id VCID-2vrb-n6cc-c7bc
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49178
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21634
published_at 2026-04-07T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21881
published_at 2026-04-04T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-12T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.2178
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21768
published_at 2026-04-09T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22897
published_at 2026-04-02T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.4076
published_at 2026-04-29T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.41013
published_at 2026-04-13T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.41056
published_at 2026-04-16T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.41027
published_at 2026-04-18T12:55:00Z
11
value 0.00191
scoring_system epss
scoring_elements 0.4095
published_at 2026-04-21T12:55:00Z
12
value 0.00191
scoring_system epss
scoring_elements 0.40857
published_at 2026-04-24T12:55:00Z
13
value 0.00191
scoring_system epss
scoring_elements 0.40844
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369977
reference_id 2369977
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369977
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://access.redhat.com/security/cve/CVE-2025-49178
reference_id CVE-2025-49178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/security/cve/CVE-2025-49178
30
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
reference_id d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:05:17Z/
url https://www.x.org/wiki/Development/Security/
60
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
61
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-49178
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vrb-n6cc-c7bc
3
url VCID-37e1-pzxj-2fdt
vulnerability_id VCID-37e1-pzxj-2fdt
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26598
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06185
published_at 2026-04-09T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06135
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-16T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06165
published_at 2026-04-13T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06173
published_at 2026-04-12T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-07T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06148
published_at 2026-04-08T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06177
published_at 2026-04-11T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08866
published_at 2026-04-29T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09164
published_at 2026-04-21T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09153
published_at 2026-04-26T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09209
published_at 2026-04-24T12:55:00Z
12
value 0.00066
scoring_system epss
scoring_elements 0.20468
published_at 2026-04-02T12:55:00Z
13
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345254
reference_id 2345254
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345254
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26598
reference_id CVE-2025-26598
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/security/cve/CVE-2025-26598
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:24:04Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26598
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37e1-pzxj-2fdt
4
url VCID-3f4a-m4rt-qqej
vulnerability_id VCID-3f4a-m4rt-qqej
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34002.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34002.json
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34002
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451112
reference_id 2451112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2451112
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
1
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2026-34002
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3f4a-m4rt-qqej
5
url VCID-41cd-s77z-6bcc
vulnerability_id VCID-41cd-s77z-6bcc
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26596
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345256
reference_id 2345256
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345256
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26596
reference_id CVE-2025-26596
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/security/cve/CVE-2025-26596
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T17:14:01Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26596
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41cd-s77z-6bcc
6
url VCID-4ngr-6ccu-r7fv
vulnerability_id VCID-4ngr-6ccu-r7fv
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-29T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-24T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.2612
published_at 2026-04-26T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.28048
published_at 2026-04-02T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.28089
published_at 2026-04-04T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27884
published_at 2026-04-18T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27951
published_at 2026-04-08T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27992
published_at 2026-04-09T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27995
published_at 2026-04-11T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27952
published_at 2026-04-12T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27893
published_at 2026-04-13T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27902
published_at 2026-04-16T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27841
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
reference_id 2272000
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2272000
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31083
reference_id CVE-2024-31083
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/security/cve/CVE-2024-31083
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T18:36:25Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-31083
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ngr-6ccu-r7fv
7
url VCID-515f-a8yj-4fej
vulnerability_id VCID-515f-a8yj-4fej
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26600
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345252
reference_id 2345252
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345252
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26600
reference_id CVE-2025-26600
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/security/cve/CVE-2025-26600
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:16:54Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26600
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-515f-a8yj-4fej
8
url VCID-5awx-j7z7-qyak
vulnerability_id VCID-5awx-j7z7-qyak
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0408
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04337
published_at 2026-04-29T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04147
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04271
published_at 2026-04-21T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04284
published_at 2026-04-24T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04304
published_at 2026-04-26T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04874
published_at 2026-04-07T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04831
published_at 2026-04-02T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04857
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06491
published_at 2026-04-11T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06484
published_at 2026-04-12T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06473
published_at 2026-04-13T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-16T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-08T12:55:00Z
13
value 0.00024
scoring_system epss
scoring_elements 0.06496
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257689
reference_id 2257689
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257689
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0408
reference_id CVE-2024-0408
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/security/cve/CVE-2024-0408
23
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
24
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:0320
25
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2169
26
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2170
27
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2995
28
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T17:14:07Z/
url https://access.redhat.com/errata/RHSA-2024:2996
29
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
30
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
31
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-0408
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5awx-j7z7-qyak
9
url VCID-6hwh-7tvr-sqgn
vulnerability_id VCID-6hwh-7tvr-sqgn
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26597
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345255
reference_id 2345255
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345255
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26597
reference_id CVE-2025-26597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/security/cve/CVE-2025-26597
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:39:35Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26597
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hwh-7tvr-sqgn
10
url VCID-6rcq-qxef-nuf7
vulnerability_id VCID-6rcq-qxef-nuf7
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52783
published_at 2026-04-29T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52842
published_at 2026-04-21T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5281
published_at 2026-04-24T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52821
published_at 2026-04-26T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
11
value 0.00321
scoring_system epss
scoring_elements 0.55161
published_at 2026-04-18T12:55:00Z
12
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
reference_id 2256690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-0229
reference_id CVE-2024-0229
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/security/cve/CVE-2024-0229
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-12T16:50:56Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-0229
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcq-qxef-nuf7
11
url VCID-7nax-5yw9-eye8
vulnerability_id VCID-7nax-5yw9-eye8
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26599
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345253
reference_id 2345253
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345253
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26599
reference_id CVE-2025-26599
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/security/cve/CVE-2025-26599
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:22:35Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26599
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nax-5yw9-eye8
12
url VCID-9cjy-6fj5-r7ag
vulnerability_id VCID-9cjy-6fj5-r7ag
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
reference_id 2271998
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271998
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31081
reference_id CVE-2024-31081
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/security/cve/CVE-2024-31081
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-04T16:37:41Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-31081
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cjy-6fj5-r7ag
13
url VCID-e9px-edn1-tufs
vulnerability_id VCID-e9px-edn1-tufs
summary xorg: xmayland: Use-after-free in XPresentNotify structure creation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62229
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01124
published_at 2026-04-08T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01109
published_at 2026-04-02T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01112
published_at 2026-04-04T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-07T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01589
published_at 2026-04-21T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02758
published_at 2026-04-29T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02664
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.0264
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02626
published_at 2026-04-12T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02624
published_at 2026-04-13T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02607
published_at 2026-04-16T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02615
published_at 2026-04-18T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02703
published_at 2026-04-26T12:55:00Z
13
value 0.00014
scoring_system epss
scoring_elements 0.02716
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402649
reference_id 2402649
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402649
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62229
reference_id CVE-2025-62229
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/security/cve/CVE-2025-62229
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-62229
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9px-edn1-tufs
14
url VCID-fgnr-h7rm-83d4
vulnerability_id VCID-fgnr-h7rm-83d4
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0409
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-29T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03005
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-21T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03124
published_at 2026-04-24T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03114
published_at 2026-04-26T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04803
published_at 2026-04-04T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04858
published_at 2026-04-08T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-09T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04852
published_at 2026-04-11T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04829
published_at 2026-04-12T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04809
published_at 2026-04-13T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04757
published_at 2026-04-16T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.0478
published_at 2026-04-02T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.0482
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257690
reference_id 2257690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257690
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0409
reference_id CVE-2024-0409
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/security/cve/CVE-2024-0409
23
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
24
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:0320
25
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2169
26
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2170
27
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2995
28
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T16:47:29Z/
url https://access.redhat.com/errata/RHSA-2024:2996
29
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
30
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-0409
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgnr-h7rm-83d4
15
url VCID-hkrr-v71f-xqdb
vulnerability_id VCID-hkrr-v71f-xqdb
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26601
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345251
reference_id 2345251
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345251
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26601
reference_id CVE-2025-26601
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/security/cve/CVE-2025-26601
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T16:08:41Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26601
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkrr-v71f-xqdb
16
url VCID-hxab-xyu1-xkgc
vulnerability_id VCID-hxab-xyu1-xkgc
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34000.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34000.json
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34000
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451107
reference_id 2451107
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2451107
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
1
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2026-34000
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxab-xyu1-xkgc
17
url VCID-j6qd-r6ua-cfbm
vulnerability_id VCID-j6qd-r6ua-cfbm
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
reference_id 2256542
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256542
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21886
reference_id CVE-2024-21886
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/security/cve/CVE-2024-21886
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-23T21:47:31Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-21886
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6qd-r6ua-cfbm
18
url VCID-juet-bb4m-hkhq
vulnerability_id VCID-juet-bb4m-hkhq
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17648
published_at 2026-04-29T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-21T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17716
published_at 2026-04-24T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17692
published_at 2026-04-26T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17991
published_at 2026-04-02T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18045
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17745
published_at 2026-04-07T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17833
published_at 2026-04-08T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17895
published_at 2026-04-09T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.1791
published_at 2026-04-11T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17866
published_at 2026-04-12T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17817
published_at 2026-04-13T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-16T12:55:00Z
13
value 0.00057
scoring_system epss
scoring_elements 0.17769
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9632
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
reference_id 1086244
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086244
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
reference_id 1086245
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086245
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
reference_id 2317233
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2317233
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2024-9632
reference_id CVE-2024-9632
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/security/cve/CVE-2024-9632
28
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
29
reference_url https://access.redhat.com/errata/RHSA-2024:10090
reference_id RHSA-2024:10090
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:10090
30
reference_url https://access.redhat.com/errata/RHSA-2024:8798
reference_id RHSA-2024:8798
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:8798
31
reference_url https://access.redhat.com/errata/RHSA-2024:9540
reference_id RHSA-2024:9540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9540
32
reference_url https://access.redhat.com/errata/RHSA-2024:9579
reference_id RHSA-2024:9579
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9579
33
reference_url https://access.redhat.com/errata/RHSA-2024:9601
reference_id RHSA-2024:9601
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9601
34
reference_url https://access.redhat.com/errata/RHSA-2024:9690
reference_id RHSA-2024:9690
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9690
35
reference_url https://access.redhat.com/errata/RHSA-2024:9816
reference_id RHSA-2024:9816
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9816
36
reference_url https://access.redhat.com/errata/RHSA-2024:9818
reference_id RHSA-2024:9818
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9818
37
reference_url https://access.redhat.com/errata/RHSA-2024:9819
reference_id RHSA-2024:9819
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9819
38
reference_url https://access.redhat.com/errata/RHSA-2024:9820
reference_id RHSA-2024:9820
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9820
39
reference_url https://access.redhat.com/errata/RHSA-2024:9901
reference_id RHSA-2024:9901
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2024:9901
40
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:12751
41
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7163
42
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7165
43
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T13:34:32Z/
url https://access.redhat.com/errata/RHSA-2025:7458
44
reference_url https://usn.ubuntu.com/7085-1/
reference_id USN-7085-1
reference_type
scores
url https://usn.ubuntu.com/7085-1/
45
reference_url https://usn.ubuntu.com/7085-2/
reference_id USN-7085-2
reference_type
scores
url https://usn.ubuntu.com/7085-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-9632
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juet-bb4m-hkhq
19
url VCID-may9-9sdj-cbbd
vulnerability_id VCID-may9-9sdj-cbbd
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49177.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49177
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09301
published_at 2026-04-07T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09325
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09409
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09438
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09424
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09377
published_at 2026-04-08T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09389
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24843
published_at 2026-04-29T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24995
published_at 2026-04-16T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24987
published_at 2026-04-18T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.2496
published_at 2026-04-21T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24897
published_at 2026-04-24T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24886
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49177
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369955
reference_id 2369955
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369955
5
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d965522c34befa6af
reference_id ab02fb96b1c701c3bb47617d965522c34befa6af
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d965522c34befa6af
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
14
reference_url https://access.redhat.com/security/cve/CVE-2025-49177
reference_id CVE-2025-49177
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/security/cve/CVE-2025-49177
15
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/errata/RHSA-2025:10258
16
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/errata/RHSA-2025:9303
17
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://access.redhat.com/errata/RHSA-2025:9304
18
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:57:08Z/
url https://www.x.org/wiki/Development/Security/
19
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-49177
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-may9-9sdj-cbbd
20
url VCID-p1tf-2c6u-tygr
vulnerability_id VCID-p1tf-2c6u-tygr
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31080.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-29T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-21T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-24T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-26T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31572
published_at 2026-04-02T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-04T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31436
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-12T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31443
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-16T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31456
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31080
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
reference_id 2271997
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2271997
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
28
reference_url https://access.redhat.com/security/cve/CVE-2024-31080
reference_id CVE-2024-31080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/security/cve/CVE-2024-31080
29
reference_url https://security.gentoo.org/glsa/202411-08
reference_id GLSA-202411-08
reference_type
scores
url https://security.gentoo.org/glsa/202411-08
30
reference_url https://access.redhat.com/errata/RHSA-2024:1785
reference_id RHSA-2024:1785
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:1785
31
reference_url https://access.redhat.com/errata/RHSA-2024:2036
reference_id RHSA-2024:2036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2036
32
reference_url https://access.redhat.com/errata/RHSA-2024:2037
reference_id RHSA-2024:2037
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2037
33
reference_url https://access.redhat.com/errata/RHSA-2024:2038
reference_id RHSA-2024:2038
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2038
34
reference_url https://access.redhat.com/errata/RHSA-2024:2039
reference_id RHSA-2024:2039
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2039
35
reference_url https://access.redhat.com/errata/RHSA-2024:2040
reference_id RHSA-2024:2040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2040
36
reference_url https://access.redhat.com/errata/RHSA-2024:2041
reference_id RHSA-2024:2041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2041
37
reference_url https://access.redhat.com/errata/RHSA-2024:2042
reference_id RHSA-2024:2042
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2042
38
reference_url https://access.redhat.com/errata/RHSA-2024:2080
reference_id RHSA-2024:2080
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2080
39
reference_url https://access.redhat.com/errata/RHSA-2024:2616
reference_id RHSA-2024:2616
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:2616
40
reference_url https://access.redhat.com/errata/RHSA-2024:3258
reference_id RHSA-2024:3258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3258
41
reference_url https://access.redhat.com/errata/RHSA-2024:3261
reference_id RHSA-2024:3261
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3261
42
reference_url https://access.redhat.com/errata/RHSA-2024:3343
reference_id RHSA-2024:3343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:3343
43
reference_url https://access.redhat.com/errata/RHSA-2024:9093
reference_id RHSA-2024:9093
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9093
44
reference_url https://access.redhat.com/errata/RHSA-2024:9122
reference_id RHSA-2024:9122
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2024:9122
45
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:05Z/
url https://access.redhat.com/errata/RHSA-2025:12751
46
reference_url https://usn.ubuntu.com/6721-1/
reference_id USN-6721-1
reference_type
scores
url https://usn.ubuntu.com/6721-1/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-31080
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1tf-2c6u-tygr
21
url VCID-pa9n-ntq3-jqaz
vulnerability_id VCID-pa9n-ntq3-jqaz
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34003.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34003.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34003
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01962
published_at 2026-04-29T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01752
published_at 2026-04-24T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01747
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34003
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34003
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451113
reference_id 2451113
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451113
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-34003
reference_id CVE-2026-34003
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/security/cve/CVE-2026-34003
16
reference_url https://access.redhat.com/errata/RHSA-2026:10739
reference_id RHSA-2026:10739
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:10739
17
reference_url https://access.redhat.com/errata/RHSA-2026:11352
reference_id RHSA-2026:11352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11352
18
reference_url https://access.redhat.com/errata/RHSA-2026:11369
reference_id RHSA-2026:11369
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11369
19
reference_url https://access.redhat.com/errata/RHSA-2026:11388
reference_id RHSA-2026:11388
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11388
20
reference_url https://access.redhat.com/errata/RHSA-2026:11656
reference_id RHSA-2026:11656
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11656
21
reference_url https://access.redhat.com/errata/RHSA-2026:11692
reference_id RHSA-2026:11692
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T17:20:40Z/
url https://access.redhat.com/errata/RHSA-2026:11692
22
reference_url https://access.redhat.com/errata/RHSA-2026:13414
reference_id RHSA-2026:13414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13414
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
1
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2026-34003
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pa9n-ntq3-jqaz
22
url VCID-phkz-t2yr-m7em
vulnerability_id VCID-phkz-t2yr-m7em
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
reference_id
reference_type
scores
0
value 0.03015
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-24T12:55:00Z
1
value 0.03015
scoring_system epss
scoring_elements 0.86616
published_at 2026-04-21T12:55:00Z
2
value 0.03015
scoring_system epss
scoring_elements 0.86643
published_at 2026-04-26T12:55:00Z
3
value 0.03015
scoring_system epss
scoring_elements 0.86642
published_at 2026-04-29T12:55:00Z
4
value 0.03264
scoring_system epss
scoring_elements 0.87105
published_at 2026-04-02T12:55:00Z
5
value 0.03264
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-04T12:55:00Z
6
value 0.03264
scoring_system epss
scoring_elements 0.87115
published_at 2026-04-07T12:55:00Z
7
value 0.03264
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-08T12:55:00Z
8
value 0.03264
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-09T12:55:00Z
9
value 0.03264
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-11T12:55:00Z
10
value 0.03264
scoring_system epss
scoring_elements 0.87151
published_at 2026-04-12T12:55:00Z
11
value 0.03264
scoring_system epss
scoring_elements 0.87146
published_at 2026-04-13T12:55:00Z
12
value 0.03264
scoring_system epss
scoring_elements 0.87163
published_at 2026-04-16T12:55:00Z
13
value 0.03264
scoring_system epss
scoring_elements 0.87167
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
reference_id 2257691
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2257691
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2023-6816
reference_id CVE-2023-6816
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/security/cve/CVE-2023-6816
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T14:05:47Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2023-6816
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-phkz-t2yr-m7em
23
url VCID-qwqu-19wq-1ke8
vulnerability_id VCID-qwqu-19wq-1ke8
summary A vulnerability has been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26594
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-09T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05724
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05761
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05767
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05731
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05771
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08492
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-26T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08486
published_at 2026-04-24T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
reference_id 1098906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098906
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
reference_id 1098907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098907
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345248
reference_id 2345248
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345248
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://access.redhat.com/security/cve/CVE-2025-26594
reference_id CVE-2025-26594
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/security/cve/CVE-2025-26594
27
reference_url https://security.gentoo.org/glsa/202506-04
reference_id GLSA-202506-04
reference_type
scores
url https://security.gentoo.org/glsa/202506-04
28
reference_url https://access.redhat.com/errata/RHSA-2025:2500
reference_id RHSA-2025:2500
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2500
29
reference_url https://access.redhat.com/errata/RHSA-2025:2502
reference_id RHSA-2025:2502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2502
30
reference_url https://access.redhat.com/errata/RHSA-2025:2861
reference_id RHSA-2025:2861
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2861
31
reference_url https://access.redhat.com/errata/RHSA-2025:2862
reference_id RHSA-2025:2862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2862
32
reference_url https://access.redhat.com/errata/RHSA-2025:2865
reference_id RHSA-2025:2865
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2865
33
reference_url https://access.redhat.com/errata/RHSA-2025:2866
reference_id RHSA-2025:2866
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2866
34
reference_url https://access.redhat.com/errata/RHSA-2025:2873
reference_id RHSA-2025:2873
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2873
35
reference_url https://access.redhat.com/errata/RHSA-2025:2874
reference_id RHSA-2025:2874
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2874
36
reference_url https://access.redhat.com/errata/RHSA-2025:2875
reference_id RHSA-2025:2875
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2875
37
reference_url https://access.redhat.com/errata/RHSA-2025:2879
reference_id RHSA-2025:2879
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2879
38
reference_url https://access.redhat.com/errata/RHSA-2025:2880
reference_id RHSA-2025:2880
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:2880
39
reference_url https://access.redhat.com/errata/RHSA-2025:3976
reference_id RHSA-2025:3976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:3976
40
reference_url https://access.redhat.com/errata/RHSA-2025:7163
reference_id RHSA-2025:7163
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7163
41
reference_url https://access.redhat.com/errata/RHSA-2025:7165
reference_id RHSA-2025:7165
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7165
42
reference_url https://access.redhat.com/errata/RHSA-2025:7458
reference_id RHSA-2025:7458
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T20:13:53Z/
url https://access.redhat.com/errata/RHSA-2025:7458
43
reference_url https://usn.ubuntu.com/7299-1/
reference_id USN-7299-1
reference_type
scores
url https://usn.ubuntu.com/7299-1/
44
reference_url https://usn.ubuntu.com/7299-2/
reference_id USN-7299-2
reference_type
scores
url https://usn.ubuntu.com/7299-2/
45
reference_url https://usn.ubuntu.com/7299-4/
reference_id USN-7299-4
reference_type
scores
url https://usn.ubuntu.com/7299-4/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2025-26594
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqu-19wq-1ke8
24
url VCID-s7xs-zcxk-nyc7
vulnerability_id VCID-s7xs-zcxk-nyc7
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49179
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17986
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17899
published_at 2026-04-12T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-11T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-09T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18079
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.1778
published_at 2026-04-07T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.357
published_at 2026-04-29T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36079
published_at 2026-04-13T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.3612
published_at 2026-04-16T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36105
published_at 2026-04-18T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36051
published_at 2026-04-21T12:55:00Z
12
value 0.00154
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-24T12:55:00Z
13
value 0.00154
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369978
reference_id 2369978
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369978
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
reference_id 2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/2bde9ca49a8fd9a1e6697d5e7ef837870d66f5d4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://access.redhat.com/security/cve/CVE-2025-49179
reference_id CVE-2025-49179
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/security/cve/CVE-2025-49179
31
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10258
32
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10342
33
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10343
34
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10344
35
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10346
36
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10347
37
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10348
38
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10349
39
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10350
40
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10351
41
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10352
42
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10355
43
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10356
44
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10360
45
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10370
46
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10374
47
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10375
48
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10376
49
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10377
50
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10378
51
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10381
52
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:10410
53
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9303
54
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9304
55
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9305
56
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9306
57
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9392
58
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://access.redhat.com/errata/RHSA-2025:9964
59
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T15:03:25Z/
url https://www.x.org/wiki/Development/Security/
60
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
61
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-49179
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s7xs-zcxk-nyc7
25
url VCID-sfgy-e6d6-f3fd
vulnerability_id VCID-sfgy-e6d6-f3fd
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49175
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24316
published_at 2026-04-04T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24188
published_at 2026-04-12T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2423
published_at 2026-04-11T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24214
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-07T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.38812
published_at 2026-04-29T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-21T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.38909
published_at 2026-04-24T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.38891
published_at 2026-04-26T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44852
published_at 2026-04-13T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44898
published_at 2026-04-18T12:55:00Z
13
value 0.00222
scoring_system epss
scoring_elements 0.44904
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee
reference_id 0885e0b26225c90534642fe911632ec0779eebee
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/0885e0b26225c90534642fe911632ec0779eebee
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
6
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024
reference_id 2024
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2024
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369947
reference_id 2369947
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369947
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
31
reference_url https://access.redhat.com/security/cve/CVE-2025-49175
reference_id CVE-2025-49175
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/security/cve/CVE-2025-49175
32
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10258
33
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10342
34
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10343
35
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10344
36
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10346
37
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10347
38
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10348
39
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10349
40
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10350
41
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10351
42
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10352
43
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10355
44
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10356
45
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10360
46
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10370
47
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10374
48
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10375
49
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10376
50
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10377
51
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10378
52
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10381
53
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:10410
54
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9303
55
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9304
56
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9305
57
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9306
58
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9392
59
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://access.redhat.com/errata/RHSA-2025:9964
60
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:53:24Z/
url https://www.x.org/wiki/Development/Security/
61
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
62
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-49175
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sfgy-e6d6-f3fd
26
url VCID-sx54-5s5r-ckg2
vulnerability_id VCID-sx54-5s5r-ckg2
summary xorg: xwayland: Use-after-free in Xkb client resource removal
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62230.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62230
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01226
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02011
published_at 2026-04-29T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0197
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01939
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01933
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01914
published_at 2026-04-16T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01913
published_at 2026-04-18T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01983
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01982
published_at 2026-04-26T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.0089
published_at 2026-04-02T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00892
published_at 2026-04-04T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-07T12:55:00Z
13
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62230
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402653
reference_id 2402653
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402653
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62230
reference_id CVE-2025-62230
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/security/cve/CVE-2025-62230
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-62230
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sx54-5s5r-ckg2
27
url VCID-t1cy-srre-nkbp
vulnerability_id VCID-t1cy-srre-nkbp
summary xorg: xmayland: Value overflow in XkbSetCompatMap()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-62231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62231
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01226
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02011
published_at 2026-04-29T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0197
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01939
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01933
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01914
published_at 2026-04-16T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01913
published_at 2026-04-18T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01983
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01982
published_at 2026-04-26T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.0089
published_at 2026-04-02T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00892
published_at 2026-04-04T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-07T12:55:00Z
13
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
reference_id 003635.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://lists.x.org/archives/xorg-announce/2025-October/003635.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402660
reference_id 2402660
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2402660
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://access.redhat.com/security/cve/CVE-2025-62231
reference_id CVE-2025-62231
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/security/cve/CVE-2025-62231
28
reference_url https://access.redhat.com/errata/RHSA-2025:19432
reference_id RHSA-2025:19432
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19432
29
reference_url https://access.redhat.com/errata/RHSA-2025:19433
reference_id RHSA-2025:19433
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19433
30
reference_url https://access.redhat.com/errata/RHSA-2025:19434
reference_id RHSA-2025:19434
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19434
31
reference_url https://access.redhat.com/errata/RHSA-2025:19435
reference_id RHSA-2025:19435
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19435
32
reference_url https://access.redhat.com/errata/RHSA-2025:19489
reference_id RHSA-2025:19489
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19489
33
reference_url https://access.redhat.com/errata/RHSA-2025:19623
reference_id RHSA-2025:19623
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19623
34
reference_url https://access.redhat.com/errata/RHSA-2025:19909
reference_id RHSA-2025:19909
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:19909
35
reference_url https://access.redhat.com/errata/RHSA-2025:20958
reference_id RHSA-2025:20958
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20958
36
reference_url https://access.redhat.com/errata/RHSA-2025:20960
reference_id RHSA-2025:20960
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20960
37
reference_url https://access.redhat.com/errata/RHSA-2025:20961
reference_id RHSA-2025:20961
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:20961
38
reference_url https://access.redhat.com/errata/RHSA-2025:21035
reference_id RHSA-2025:21035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:21035
39
reference_url https://access.redhat.com/errata/RHSA-2025:22040
reference_id RHSA-2025:22040
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22040
40
reference_url https://access.redhat.com/errata/RHSA-2025:22041
reference_id RHSA-2025:22041
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22041
41
reference_url https://access.redhat.com/errata/RHSA-2025:22051
reference_id RHSA-2025:22051
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22051
42
reference_url https://access.redhat.com/errata/RHSA-2025:22055
reference_id RHSA-2025:22055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22055
43
reference_url https://access.redhat.com/errata/RHSA-2025:22056
reference_id RHSA-2025:22056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22056
44
reference_url https://access.redhat.com/errata/RHSA-2025:22077
reference_id RHSA-2025:22077
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22077
45
reference_url https://access.redhat.com/errata/RHSA-2025:22096
reference_id RHSA-2025:22096
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22096
46
reference_url https://access.redhat.com/errata/RHSA-2025:22164
reference_id RHSA-2025:22164
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22164
47
reference_url https://access.redhat.com/errata/RHSA-2025:22167
reference_id RHSA-2025:22167
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22167
48
reference_url https://access.redhat.com/errata/RHSA-2025:22364
reference_id RHSA-2025:22364
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22364
49
reference_url https://access.redhat.com/errata/RHSA-2025:22365
reference_id RHSA-2025:22365
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22365
50
reference_url https://access.redhat.com/errata/RHSA-2025:22426
reference_id RHSA-2025:22426
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22426
51
reference_url https://access.redhat.com/errata/RHSA-2025:22427
reference_id RHSA-2025:22427
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22427
52
reference_url https://access.redhat.com/errata/RHSA-2025:22667
reference_id RHSA-2025:22667
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22667
53
reference_url https://access.redhat.com/errata/RHSA-2025:22729
reference_id RHSA-2025:22729
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22729
54
reference_url https://access.redhat.com/errata/RHSA-2025:22742
reference_id RHSA-2025:22742
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22742
55
reference_url https://access.redhat.com/errata/RHSA-2025:22753
reference_id RHSA-2025:22753
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2025:22753
56
reference_url https://access.redhat.com/errata/RHSA-2026:0031
reference_id RHSA-2026:0031
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0031
57
reference_url https://access.redhat.com/errata/RHSA-2026:0033
reference_id RHSA-2026:0033
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0033
58
reference_url https://access.redhat.com/errata/RHSA-2026:0034
reference_id RHSA-2026:0034
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0034
59
reference_url https://access.redhat.com/errata/RHSA-2026:0035
reference_id RHSA-2026:0035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0035
60
reference_url https://access.redhat.com/errata/RHSA-2026:0036
reference_id RHSA-2026:0036
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:34Z/
url https://access.redhat.com/errata/RHSA-2026:0036
61
reference_url https://usn.ubuntu.com/7846-1/
reference_id USN-7846-1
reference_type
scores
url https://usn.ubuntu.com/7846-1/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-62231
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1cy-srre-nkbp
28
url VCID-trsp-u7xt-a3ck
vulnerability_id VCID-trsp-u7xt-a3ck
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6377
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59416
published_at 2026-04-21T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.60023
published_at 2026-04-29T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.60018
published_at 2026-04-24T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.60036
published_at 2026-04-26T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61372
published_at 2026-04-07T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61434
published_at 2026-04-09T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61455
published_at 2026-04-11T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61441
published_at 2026-04-12T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-13T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61461
published_at 2026-04-16T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61465
published_at 2026-04-18T12:55:00Z
11
value 0.00411
scoring_system epss
scoring_elements 0.61374
published_at 2026-04-02T12:55:00Z
12
value 0.00411
scoring_system epss
scoring_elements 0.61418
published_at 2026-04-08T12:55:00Z
13
value 0.00411
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253291
reference_id 2253291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253291
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7886
reference_id RHSA-2023:7886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7886
8
reference_url https://access.redhat.com/errata/RHSA-2024:0006
reference_id RHSA-2024:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0006
9
reference_url https://access.redhat.com/errata/RHSA-2024:0009
reference_id RHSA-2024:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0009
10
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
11
reference_url https://access.redhat.com/errata/RHSA-2024:0014
reference_id RHSA-2024:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0014
12
reference_url https://access.redhat.com/errata/RHSA-2024:0015
reference_id RHSA-2024:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0015
13
reference_url https://access.redhat.com/errata/RHSA-2024:0016
reference_id RHSA-2024:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0016
14
reference_url https://access.redhat.com/errata/RHSA-2024:0017
reference_id RHSA-2024:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0017
15
reference_url https://access.redhat.com/errata/RHSA-2024:0018
reference_id RHSA-2024:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0018
16
reference_url https://access.redhat.com/errata/RHSA-2024:0020
reference_id RHSA-2024:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0020
17
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
18
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
19
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
20
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
21
reference_url https://access.redhat.com/errata/RHSA-2025:13998
reference_id RHSA-2025:13998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13998
22
reference_url https://usn.ubuntu.com/6555-1/
reference_id USN-6555-1
reference_type
scores
url https://usn.ubuntu.com/6555-1/
23
reference_url https://usn.ubuntu.com/6555-2/
reference_id USN-6555-2
reference_type
scores
url https://usn.ubuntu.com/6555-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2023-6377
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trsp-u7xt-a3ck
29
url VCID-un9v-4svv-2baj
vulnerability_id VCID-un9v-4svv-2baj
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20089
published_at 2026-04-02T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20146
published_at 2026-04-04T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19876
published_at 2026-04-07T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-08T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-09T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-11T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19985
published_at 2026-04-12T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19927
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19905
published_at 2026-04-16T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19909
published_at 2026-04-18T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19906
published_at 2026-04-21T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19799
published_at 2026-04-24T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19794
published_at 2026-04-26T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
reference_id 2243091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243091
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:6802
reference_id RHSA-2023:6802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6802
8
reference_url https://access.redhat.com/errata/RHSA-2023:6808
reference_id RHSA-2023:6808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6808
9
reference_url https://access.redhat.com/errata/RHSA-2023:7373
reference_id RHSA-2023:7373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7373
10
reference_url https://access.redhat.com/errata/RHSA-2023:7388
reference_id RHSA-2023:7388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7388
11
reference_url https://access.redhat.com/errata/RHSA-2023:7405
reference_id RHSA-2023:7405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7405
12
reference_url https://access.redhat.com/errata/RHSA-2023:7428
reference_id RHSA-2023:7428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7428
13
reference_url https://access.redhat.com/errata/RHSA-2023:7436
reference_id RHSA-2023:7436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7436
14
reference_url https://access.redhat.com/errata/RHSA-2023:7526
reference_id RHSA-2023:7526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7526
15
reference_url https://access.redhat.com/errata/RHSA-2023:7533
reference_id RHSA-2023:7533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7533
16
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
17
reference_url https://access.redhat.com/errata/RHSA-2024:0128
reference_id RHSA-2024:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0128
18
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
19
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
20
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
21
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
22
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
23
reference_url https://usn.ubuntu.com/6453-1/
reference_id USN-6453-1
reference_type
scores
url https://usn.ubuntu.com/6453-1/
24
reference_url https://usn.ubuntu.com/6453-2/
reference_id USN-6453-2
reference_type
scores
url https://usn.ubuntu.com/6453-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2023-5367
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un9v-4svv-2baj
30
url VCID-v9p1-8sb6-9ufr
vulnerability_id VCID-v9p1-8sb6-9ufr
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46931
published_at 2026-04-29T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46983
published_at 2026-04-21T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46969
published_at 2026-04-24T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-26T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49268
published_at 2026-04-02T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4925
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-08T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49301
published_at 2026-04-09T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49319
published_at 2026-04-11T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49293
published_at 2026-04-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49344
published_at 2026-04-16T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.4934
published_at 2026-04-18T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49296
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
reference_id 2256540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256540
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
reference_id cpe:/o:redhat:enterprise_linux:7::computenode
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
30
reference_url https://access.redhat.com/security/cve/CVE-2024-21885
reference_id CVE-2024-21885
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/security/cve/CVE-2024-21885
31
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
32
reference_url https://access.redhat.com/errata/RHSA-2024:0320
reference_id RHSA-2024:0320
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0320
33
reference_url https://access.redhat.com/errata/RHSA-2024:0557
reference_id RHSA-2024:0557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0557
34
reference_url https://access.redhat.com/errata/RHSA-2024:0558
reference_id RHSA-2024:0558
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0558
35
reference_url https://access.redhat.com/errata/RHSA-2024:0597
reference_id RHSA-2024:0597
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0597
36
reference_url https://access.redhat.com/errata/RHSA-2024:0607
reference_id RHSA-2024:0607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0607
37
reference_url https://access.redhat.com/errata/RHSA-2024:0614
reference_id RHSA-2024:0614
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0614
38
reference_url https://access.redhat.com/errata/RHSA-2024:0617
reference_id RHSA-2024:0617
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0617
39
reference_url https://access.redhat.com/errata/RHSA-2024:0621
reference_id RHSA-2024:0621
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0621
40
reference_url https://access.redhat.com/errata/RHSA-2024:0626
reference_id RHSA-2024:0626
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0626
41
reference_url https://access.redhat.com/errata/RHSA-2024:0629
reference_id RHSA-2024:0629
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:0629
42
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2169
43
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2170
44
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2995
45
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2024:2996
46
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T16:17:45Z/
url https://access.redhat.com/errata/RHSA-2025:12751
47
reference_url https://usn.ubuntu.com/6587-1/
reference_id USN-6587-1
reference_type
scores
url https://usn.ubuntu.com/6587-1/
48
reference_url https://usn.ubuntu.com/6587-2/
reference_id USN-6587-2
reference_type
scores
url https://usn.ubuntu.com/6587-2/
49
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2024-21885
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9p1-8sb6-9ufr
31
url VCID-wyuw-13t9-rbg1
vulnerability_id VCID-wyuw-13t9-rbg1
summary xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49176
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24316
published_at 2026-04-04T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24188
published_at 2026-04-12T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2423
published_at 2026-04-11T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24214
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-07T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44675
published_at 2026-04-29T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44852
published_at 2026-04-13T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44904
published_at 2026-04-16T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44898
published_at 2026-04-18T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44832
published_at 2026-04-21T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44745
published_at 2026-04-24T12:55:00Z
13
value 0.00222
scoring_system epss
scoring_elements 0.44752
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9
reference_id 03731b326a80b582e48d939fe62cb1e2b10400d9
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073
reference_id 1108073
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108073
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
reference_id 1108369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108369
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369954
reference_id 2369954
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2369954
8
reference_url https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
reference_id 4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.6::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.8::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
reference_id cpe:/o:redhat:rhel_aus:7.7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:7.7::server
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
reference_id cpe:/o:redhat:rhel_els:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:6
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
32
reference_url https://access.redhat.com/security/cve/CVE-2025-49176
reference_id CVE-2025-49176
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/security/cve/CVE-2025-49176
33
reference_url https://access.redhat.com/errata/RHSA-2025:10258
reference_id RHSA-2025:10258
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10258
34
reference_url https://access.redhat.com/errata/RHSA-2025:10342
reference_id RHSA-2025:10342
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10342
35
reference_url https://access.redhat.com/errata/RHSA-2025:10343
reference_id RHSA-2025:10343
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10343
36
reference_url https://access.redhat.com/errata/RHSA-2025:10344
reference_id RHSA-2025:10344
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10344
37
reference_url https://access.redhat.com/errata/RHSA-2025:10346
reference_id RHSA-2025:10346
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10346
38
reference_url https://access.redhat.com/errata/RHSA-2025:10347
reference_id RHSA-2025:10347
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10347
39
reference_url https://access.redhat.com/errata/RHSA-2025:10348
reference_id RHSA-2025:10348
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10348
40
reference_url https://access.redhat.com/errata/RHSA-2025:10349
reference_id RHSA-2025:10349
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10349
41
reference_url https://access.redhat.com/errata/RHSA-2025:10350
reference_id RHSA-2025:10350
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10350
42
reference_url https://access.redhat.com/errata/RHSA-2025:10351
reference_id RHSA-2025:10351
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10351
43
reference_url https://access.redhat.com/errata/RHSA-2025:10352
reference_id RHSA-2025:10352
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10352
44
reference_url https://access.redhat.com/errata/RHSA-2025:10355
reference_id RHSA-2025:10355
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10355
45
reference_url https://access.redhat.com/errata/RHSA-2025:10356
reference_id RHSA-2025:10356
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10356
46
reference_url https://access.redhat.com/errata/RHSA-2025:10360
reference_id RHSA-2025:10360
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10360
47
reference_url https://access.redhat.com/errata/RHSA-2025:10370
reference_id RHSA-2025:10370
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10370
48
reference_url https://access.redhat.com/errata/RHSA-2025:10374
reference_id RHSA-2025:10374
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10374
49
reference_url https://access.redhat.com/errata/RHSA-2025:10375
reference_id RHSA-2025:10375
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10375
50
reference_url https://access.redhat.com/errata/RHSA-2025:10376
reference_id RHSA-2025:10376
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10376
51
reference_url https://access.redhat.com/errata/RHSA-2025:10377
reference_id RHSA-2025:10377
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10377
52
reference_url https://access.redhat.com/errata/RHSA-2025:10378
reference_id RHSA-2025:10378
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10378
53
reference_url https://access.redhat.com/errata/RHSA-2025:10381
reference_id RHSA-2025:10381
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10381
54
reference_url https://access.redhat.com/errata/RHSA-2025:10410
reference_id RHSA-2025:10410
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:10410
55
reference_url https://access.redhat.com/errata/RHSA-2025:9303
reference_id RHSA-2025:9303
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9303
56
reference_url https://access.redhat.com/errata/RHSA-2025:9304
reference_id RHSA-2025:9304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9304
57
reference_url https://access.redhat.com/errata/RHSA-2025:9305
reference_id RHSA-2025:9305
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9305
58
reference_url https://access.redhat.com/errata/RHSA-2025:9306
reference_id RHSA-2025:9306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9306
59
reference_url https://access.redhat.com/errata/RHSA-2025:9392
reference_id RHSA-2025:9392
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9392
60
reference_url https://access.redhat.com/errata/RHSA-2025:9964
reference_id RHSA-2025:9964
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://access.redhat.com/errata/RHSA-2025:9964
61
reference_url https://www.x.org/wiki/Development/Security/
reference_id Security
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:58:49Z/
url https://www.x.org/wiki/Development/Security/
62
reference_url https://usn.ubuntu.com/7573-1/
reference_id USN-7573-1
reference_type
scores
url https://usn.ubuntu.com/7573-1/
63
reference_url https://usn.ubuntu.com/7573-2/
reference_id USN-7573-2
reference_type
scores
url https://usn.ubuntu.com/7573-2/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.9-1
purl pkg:deb/debian/xwayland@2:24.1.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3f4a-m4rt-qqej
1
vulnerability VCID-hxab-xyu1-xkgc
2
vulnerability VCID-pa9n-ntq3-jqaz
3
vulnerability VCID-wzer-jnm3-rqa8
4
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.9-1
1
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
2
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2025-49176
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyuw-13t9-rbg1
32
url VCID-wzer-jnm3-rqa8
vulnerability_id VCID-wzer-jnm3-rqa8
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33999.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33999.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33999
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01819
published_at 2026-04-29T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01781
published_at 2026-04-24T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01776
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33999
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33999
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451106
reference_id 2451106
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451106
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-33999
reference_id CVE-2026-33999
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/security/cve/CVE-2026-33999
16
reference_url https://access.redhat.com/errata/RHSA-2026:10739
reference_id RHSA-2026:10739
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:10739
17
reference_url https://access.redhat.com/errata/RHSA-2026:11352
reference_id RHSA-2026:11352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11352
18
reference_url https://access.redhat.com/errata/RHSA-2026:11369
reference_id RHSA-2026:11369
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11369
19
reference_url https://access.redhat.com/errata/RHSA-2026:11388
reference_id RHSA-2026:11388
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11388
20
reference_url https://access.redhat.com/errata/RHSA-2026:11656
reference_id RHSA-2026:11656
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11656
21
reference_url https://access.redhat.com/errata/RHSA-2026:11692
reference_id RHSA-2026:11692
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-24T03:55:33Z/
url https://access.redhat.com/errata/RHSA-2026:11692
22
reference_url https://access.redhat.com/errata/RHSA-2026:13414
reference_id RHSA-2026:13414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13414
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
1
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2026-33999
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wzer-jnm3-rqa8
33
url VCID-x3dk-fny6-fqa5
vulnerability_id VCID-x3dk-fny6-fqa5
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34001.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34001
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02741
published_at 2026-04-24T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02727
published_at 2026-04-26T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03012
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34001
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451109
reference_id 2451109
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451109
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-34001
reference_id CVE-2026-34001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/security/cve/CVE-2026-34001
16
reference_url https://access.redhat.com/errata/RHSA-2026:10739
reference_id RHSA-2026:10739
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:10739
17
reference_url https://access.redhat.com/errata/RHSA-2026:11352
reference_id RHSA-2026:11352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11352
18
reference_url https://access.redhat.com/errata/RHSA-2026:11369
reference_id RHSA-2026:11369
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11369
19
reference_url https://access.redhat.com/errata/RHSA-2026:11388
reference_id RHSA-2026:11388
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11388
20
reference_url https://access.redhat.com/errata/RHSA-2026:11656
reference_id RHSA-2026:11656
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11656
21
reference_url https://access.redhat.com/errata/RHSA-2026:11692
reference_id RHSA-2026:11692
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-23T16:19:24Z/
url https://access.redhat.com/errata/RHSA-2026:11692
22
reference_url https://access.redhat.com/errata/RHSA-2026:13414
reference_id RHSA-2026:13414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13414
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.10-1
purl pkg:deb/debian/xwayland@2:24.1.10-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.10-1
1
url pkg:deb/debian/xwayland@2:24.1.11-1
purl pkg:deb/debian/xwayland@2:24.1.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.11-1
aliases CVE-2026-34001
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3dk-fny6-fqa5
34
url VCID-x3p6-a59z-ebf3
vulnerability_id VCID-x3p6-a59z-ebf3
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
reference_id
reference_type
scores
0
value 0.00958
scoring_system epss
scoring_elements 0.76482
published_at 2026-04-21T12:55:00Z
1
value 0.01143
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-29T12:55:00Z
2
value 0.01143
scoring_system epss
scoring_elements 0.78499
published_at 2026-04-24T12:55:00Z
3
value 0.01143
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-26T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78941
published_at 2026-04-07T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-09T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.78996
published_at 2026-04-18T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-12T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78971
published_at 2026-04-13T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-16T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-02T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.78966
published_at 2026-04-08T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.78958
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6478
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
reference_id 2253298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253298
6
reference_url https://security.gentoo.org/glsa/202401-30
reference_id GLSA-202401-30
reference_type
scores
url https://security.gentoo.org/glsa/202401-30
7
reference_url https://access.redhat.com/errata/RHSA-2023:7886
reference_id RHSA-2023:7886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7886
8
reference_url https://access.redhat.com/errata/RHSA-2024:0006
reference_id RHSA-2024:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0006
9
reference_url https://access.redhat.com/errata/RHSA-2024:0009
reference_id RHSA-2024:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0009
10
reference_url https://access.redhat.com/errata/RHSA-2024:0010
reference_id RHSA-2024:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0010
11
reference_url https://access.redhat.com/errata/RHSA-2024:0014
reference_id RHSA-2024:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0014
12
reference_url https://access.redhat.com/errata/RHSA-2024:0015
reference_id RHSA-2024:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0015
13
reference_url https://access.redhat.com/errata/RHSA-2024:0016
reference_id RHSA-2024:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0016
14
reference_url https://access.redhat.com/errata/RHSA-2024:0017
reference_id RHSA-2024:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0017
15
reference_url https://access.redhat.com/errata/RHSA-2024:0018
reference_id RHSA-2024:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0018
16
reference_url https://access.redhat.com/errata/RHSA-2024:0020
reference_id RHSA-2024:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0020
17
reference_url https://access.redhat.com/errata/RHSA-2024:2169
reference_id RHSA-2024:2169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2169
18
reference_url https://access.redhat.com/errata/RHSA-2024:2170
reference_id RHSA-2024:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2170
19
reference_url https://access.redhat.com/errata/RHSA-2024:2995
reference_id RHSA-2024:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2995
20
reference_url https://access.redhat.com/errata/RHSA-2024:2996
reference_id RHSA-2024:2996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2996
21
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
22
reference_url https://usn.ubuntu.com/6555-1/
reference_id USN-6555-1
reference_type
scores
url https://usn.ubuntu.com/6555-1/
23
reference_url https://usn.ubuntu.com/6555-2/
reference_id USN-6555-2
reference_type
scores
url https://usn.ubuntu.com/6555-2/
24
reference_url https://usn.ubuntu.com/6587-5/
reference_id USN-6587-5
reference_type
scores
url https://usn.ubuntu.com/6587-5/
fixed_packages
0
url pkg:deb/debian/xwayland@2:24.1.6-1
purl pkg:deb/debian/xwayland@2:24.1.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cp3-p3yx-17be
1
vulnerability VCID-2vrb-n6cc-c7bc
2
vulnerability VCID-3f4a-m4rt-qqej
3
vulnerability VCID-e9px-edn1-tufs
4
vulnerability VCID-hxab-xyu1-xkgc
5
vulnerability VCID-may9-9sdj-cbbd
6
vulnerability VCID-pa9n-ntq3-jqaz
7
vulnerability VCID-s7xs-zcxk-nyc7
8
vulnerability VCID-sfgy-e6d6-f3fd
9
vulnerability VCID-sx54-5s5r-ckg2
10
vulnerability VCID-t1cy-srre-nkbp
11
vulnerability VCID-wyuw-13t9-rbg1
12
vulnerability VCID-wzer-jnm3-rqa8
13
vulnerability VCID-x3dk-fny6-fqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:24.1.6-1
aliases CVE-2023-6478
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3p6-a59z-ebf3
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xwayland@2:22.1.9-1