{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46296?format=json","vulnerability_id":"VCID-cxf3-8znp-rbbz","summary":"Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.","aliases":[{"alias":"CVE-2022-3553"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943567?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/995209?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11"},{"url":"http://public2.vulnerablecode.io/api/packages/943530?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1089433?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.7-3%2Bdeb12u12","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.7-3%252Bdeb12u12"},{"url":"http://public2.vulnerablecode.io/api/packages/943534?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.16-1.3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.16-1.3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943533?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.21-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067651?format=json","purl":"pkg:deb/debian/xorg-server@2:21.1.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:21.1.22-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/76695?format=json","purl":"pkg:ebuild/x11-base/xorg-server@21.1.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@21.1.8"},{"url":"http://public2.vulnerablecode.io/api/packages/76696?format=json","purl":"pkg:ebuild/x11-base/xwayland@21.1.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@21.1.8"},{"url":"http://public2.vulnerablecode.io/api/packages/76697?format=json","purl":"pkg:ebuild/x11-base/xwayland@23.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xwayland@23.1.1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995208?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pcv-f5h3-9fe9"},{"vulnerability":"VCID-2cp3-p3yx-17be"},{"vulnerability":"VCID-2vrb-n6cc-c7bc"},{"vulnerability":"VCID-37e1-pzxj-2fdt"},{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-41cd-s77z-6bcc"},{"vulnerability":"VCID-515f-a8yj-4fej"},{"vulnerability":"VCID-6hwh-7tvr-sqgn"},{"vulnerability":"VCID-7nax-5yw9-eye8"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-e9px-edn1-tufs"},{"vulnerability":"VCID-hkrr-v71f-xqdb"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-juet-bb4m-hkhq"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-qwqu-19wq-1ke8"},{"vulnerability":"VCID-s7xs-zcxk-nyc7"},{"vulnerability":"VCID-sfgy-e6d6-f3fd"},{"vulnerability":"VCID-sx54-5s5r-ckg2"},{"vulnerability":"VCID-t1cy-srre-nkbp"},{"vulnerability":"VCID-wyuw-13t9-rbg1"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13"},{"url":"http://public2.vulnerablecode.io/api/packages/943532?format=json","purl":"pkg:deb/debian/xorg-server@2:1.20.11-1%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3f4a-m4rt-qqej"},{"vulnerability":"VCID-b14x-4mtq-5fc7"},{"vulnerability":"VCID-cxf3-8znp-rbbz"},{"vulnerability":"VCID-hxab-xyu1-xkgc"},{"vulnerability":"VCID-pa9n-ntq3-jqaz"},{"vulnerability":"VCID-wzer-jnm3-rqa8"},{"vulnerability":"VCID-x3dk-fny6-fqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xorg-server@2:1.20.11-1%252Bdeb11u13%3Fdistro=trixie"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3553","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30279","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30167","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30238","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30246","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30172","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30194","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30265","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30788","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30387","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30305","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140706","reference_id":"2140706","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140706"},{"reference_url":"https://security.gentoo.org/glsa/202305-30","reference_id":"GLSA-202305-30","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/"}],"url":"https://security.gentoo.org/glsa/202305-30"},{"reference_url":"https://vuldb.com/?id.211053","reference_id":"?id.211053","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/"}],"url":"https://vuldb.com/?id.211053"},{"reference_url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3","reference_id":"?id=dfd057996b26420309c324ec844a5ba6dd07eda3","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:45Z/"}],"url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3"}],"weaknesses":[{"cwe_id":404,"name":"Improper Resource Shutdown or Release","description":"The product does not release or incorrectly releases a resource before it is made available for re-use."}],"exploits":[],"severity_range_score":"3.5 - 6.5","exploitability":"0.5","weighted_severity":"5.9","risk_score":3.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cxf3-8znp-rbbz"}