{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49850?format=json","vulnerability_id":"VCID-2cqy-wq3e-dyat","summary":"Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.","aliases":[{"alias":"CVE-2020-26117"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941159?format=json","purl":"pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941152?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1049622?format=json","purl":"pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1"},{"url":"http://public2.vulnerablecode.io/api/packages/941150?format=json","purl":"pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941153?format=json","purl":"pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/78037?format=json","purl":"pkg:ebuild/net-misc/tigervnc@1.12.0-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/tigervnc@1.12.0-r2"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049620?format=json","purl":"pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cqy-wq3e-dyat"},{"vulnerability":"VCID-4kdt-7mph-j3ej"},{"vulnerability":"VCID-58x9-2uk3-6bhp"},{"vulnerability":"VCID-vgaa-3fm8-bbdq"},{"vulnerability":"VCID-wspa-k6wk-kqhb"},{"vulnerability":"VCID-yvqe-mjea-pud2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%252Bdeb9u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049621?format=json","purl":"pkg:deb/debian/tigervnc@1.9.0%2Bdfsg-3%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cqy-wq3e-dyat"},{"vulnerability":"VCID-4kdt-7mph-j3ej"},{"vulnerability":"VCID-58x9-2uk3-6bhp"},{"vulnerability":"VCID-vgaa-3fm8-bbdq"},{"vulnerability":"VCID-wspa-k6wk-kqhb"},{"vulnerability":"VCID-yvqe-mjea-pud2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.9.0%252Bdfsg-3%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/101801?format=json","purl":"pkg:rpm/redhat/tigervnc@1.11.0-6?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cqy-wq3e-dyat"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tigervnc@1.11.0-6%3Farch=el8"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26117","reference_id":"","reference_type":"","scores":[{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71863","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7182","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76123","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1882841","reference_id":"1882841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1882841"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272","reference_id":"971272","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272"},{"reference_url":"https://security.gentoo.org/glsa/202407-14","reference_id":"GLSA-202407-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1783","reference_id":"RHSA-2021:1783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1783"},{"reference_url":"https://usn.ubuntu.com/5965-1/","reference_id":"USN-5965-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5965-1/"}],"weaknesses":[{"cwe_id":296,"name":"Improper Following of a Certificate's Chain of Trust","description":"The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate."}],"exploits":[],"severity_range_score":"8.1 - 9.3","exploitability":"0.5","weighted_severity":"7.3","risk_score":3.6,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cqy-wq3e-dyat"}