Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-rntx-ztv9-sqax
Summary
Multiple vulnerabilities have been reported in libXfont and TightVNC,
    allowing for the execution of arbitrary code with root privileges.
Aliases
0
alias CVE-2007-1352
Fixed_packages
0
url pkg:deb/debian/libxfont@1:1.2.2-2?distro=trixie
purl pkg:deb/debian/libxfont@1:1.2.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.2.2-2%3Fdistro=trixie
1
url pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.4-1%3Fdistro=trixie
2
url pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-1%3Fdistro=trixie
3
url pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
purl pkg:deb/debian/libxfont@1:2.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.6-2%3Fdistro=trixie
4
url pkg:ebuild/net-misc/tightvnc@1.2.9-r4
purl pkg:ebuild/net-misc/tightvnc@1.2.9-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/tightvnc@1.2.9-r4
5
url pkg:ebuild/x11-libs/libXfont@1.2.7-r1
purl pkg:ebuild/x11-libs/libXfont@1.2.7-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXfont@1.2.7-r1
6
url pkg:ebuild/x11-libs/libXfont@1.2.9-r4
purl pkg:ebuild/x11-libs/libXfont@1.2.9-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/libXfont@1.2.9-r4
Affected_packages
0
url pkg:rpm/redhat/libXfont@1.2.2-1.0.2?arch=el5
purl pkg:rpm/redhat/libXfont@1.2.2-1.0.2?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qn37-kjm4-tbap
1
vulnerability VCID-rntx-ztv9-sqax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libXfont@1.2.2-1.0.2%3Farch=el5
1
url pkg:rpm/redhat/XFree86@4.1.0-82?arch=EL
purl pkg:rpm/redhat/XFree86@4.1.0-82?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qn37-kjm4-tbap
1
vulnerability VCID-rntx-ztv9-sqax
2
vulnerability VCID-tmht-8fhj-uue1
3
vulnerability VCID-zz57-zmka-33ev
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/XFree86@4.1.0-82%3Farch=EL
2
url pkg:rpm/redhat/XFree86@4.3.0-120?arch=EL
purl pkg:rpm/redhat/XFree86@4.3.0-120?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qn37-kjm4-tbap
1
vulnerability VCID-rntx-ztv9-sqax
2
vulnerability VCID-tmht-8fhj-uue1
3
vulnerability VCID-zz57-zmka-33ev
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/XFree86@4.3.0-120%3Farch=EL
3
url pkg:rpm/redhat/xorg-x11@6.8.2-1.EL.13.37?arch=7
purl pkg:rpm/redhat/xorg-x11@6.8.2-1.EL.13.37?arch=7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qn37-kjm4-tbap
1
vulnerability VCID-rntx-ztv9-sqax
2
vulnerability VCID-tmht-8fhj-uue1
3
vulnerability VCID-zz57-zmka-33ev
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xorg-x11@6.8.2-1.EL.13.37%3Farch=7
References
0
reference_url http://issues.foresightlinux.org/browse/FL-223
reference_id
reference_type
scores
url http://issues.foresightlinux.org/browse/FL-223
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0125.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0125.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1352.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1352
reference_id
reference_type
scores
0
value 0.01697
scoring_system epss
scoring_elements 0.82466
published_at 2026-05-14T12:55:00Z
1
value 0.01697
scoring_system epss
scoring_elements 0.82208
published_at 2026-04-01T12:55:00Z
2
value 0.01697
scoring_system epss
scoring_elements 0.8222
published_at 2026-04-02T12:55:00Z
3
value 0.01697
scoring_system epss
scoring_elements 0.82241
published_at 2026-04-04T12:55:00Z
4
value 0.01697
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-07T12:55:00Z
5
value 0.01697
scoring_system epss
scoring_elements 0.82263
published_at 2026-04-08T12:55:00Z
6
value 0.01697
scoring_system epss
scoring_elements 0.82271
published_at 2026-04-09T12:55:00Z
7
value 0.01697
scoring_system epss
scoring_elements 0.8229
published_at 2026-04-11T12:55:00Z
8
value 0.01697
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-12T12:55:00Z
9
value 0.01697
scoring_system epss
scoring_elements 0.82277
published_at 2026-04-13T12:55:00Z
10
value 0.01697
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-16T12:55:00Z
11
value 0.01697
scoring_system epss
scoring_elements 0.82313
published_at 2026-04-18T12:55:00Z
12
value 0.01697
scoring_system epss
scoring_elements 0.82315
published_at 2026-04-21T12:55:00Z
13
value 0.01697
scoring_system epss
scoring_elements 0.82336
published_at 2026-04-24T12:55:00Z
14
value 0.01697
scoring_system epss
scoring_elements 0.82347
published_at 2026-04-26T12:55:00Z
15
value 0.01697
scoring_system epss
scoring_elements 0.82351
published_at 2026-04-29T12:55:00Z
16
value 0.01697
scoring_system epss
scoring_elements 0.82368
published_at 2026-05-05T12:55:00Z
17
value 0.01697
scoring_system epss
scoring_elements 0.8239
published_at 2026-05-07T12:55:00Z
18
value 0.01697
scoring_system epss
scoring_elements 0.82411
published_at 2026-05-09T12:55:00Z
19
value 0.01697
scoring_system epss
scoring_elements 0.82409
published_at 2026-05-11T12:55:00Z
20
value 0.01697
scoring_system epss
scoring_elements 0.82426
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1352
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352
9
reference_url http://secunia.com/advisories/24741
reference_id
reference_type
scores
url http://secunia.com/advisories/24741
10
reference_url http://secunia.com/advisories/24745
reference_id
reference_type
scores
url http://secunia.com/advisories/24745
11
reference_url http://secunia.com/advisories/24756
reference_id
reference_type
scores
url http://secunia.com/advisories/24756
12
reference_url http://secunia.com/advisories/24758
reference_id
reference_type
scores
url http://secunia.com/advisories/24758
13
reference_url http://secunia.com/advisories/24765
reference_id
reference_type
scores
url http://secunia.com/advisories/24765
14
reference_url http://secunia.com/advisories/24770
reference_id
reference_type
scores
url http://secunia.com/advisories/24770
15
reference_url http://secunia.com/advisories/24771
reference_id
reference_type
scores
url http://secunia.com/advisories/24771
16
reference_url http://secunia.com/advisories/24772
reference_id
reference_type
scores
url http://secunia.com/advisories/24772
17
reference_url http://secunia.com/advisories/24791
reference_id
reference_type
scores
url http://secunia.com/advisories/24791
18
reference_url http://secunia.com/advisories/25004
reference_id
reference_type
scores
url http://secunia.com/advisories/25004
19
reference_url http://secunia.com/advisories/25006
reference_id
reference_type
scores
url http://secunia.com/advisories/25006
20
reference_url http://secunia.com/advisories/25195
reference_id
reference_type
scores
url http://secunia.com/advisories/25195
21
reference_url http://secunia.com/advisories/25216
reference_id
reference_type
scores
url http://secunia.com/advisories/25216
22
reference_url http://secunia.com/advisories/25305
reference_id
reference_type
scores
url http://secunia.com/advisories/25305
23
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
24
reference_url http://security.gentoo.org/glsa/glsa-200705-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-10.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
26
reference_url https://issues.rpath.com/browse/RPL-1213
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1213
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
29
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
30
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
31
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
32
reference_url http://www.debian.org/security/2007/dsa-1294
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1294
33
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
34
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
35
reference_url http://www.novell.com/linux/security/advisories/2007_27_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_27_x.html
36
reference_url http://www.openbsd.org/errata39.html#021_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata39.html#021_xorg
37
reference_url http://www.openbsd.org/errata40.html#011_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata40.html#011_xorg
38
reference_url http://www.redhat.com/support/errata/RHSA-2007-0126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0126.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2007-0132.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0132.html
40
reference_url http://www.securityfocus.com/archive/1/464686/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464686/100/0/threaded
41
reference_url http://www.securityfocus.com/archive/1/464816/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464816/100/0/threaded
42
reference_url http://www.securityfocus.com/bid/23283
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23283
43
reference_url http://www.securityfocus.com/bid/23300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23300
44
reference_url http://www.securitytracker.com/id?1017857
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017857
45
reference_url http://www.ubuntu.com/usn/usn-448-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-448-1
46
reference_url http://www.vupen.com/english/advisories/2007/1217
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1217
47
reference_url http://www.vupen.com/english/advisories/2007/1548
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1548
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235265
reference_id 235265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235265
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1352
reference_id CVE-2007-1352
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1352
106
reference_url https://security.gentoo.org/glsa/200705-10
reference_id GLSA-200705-10
reference_type
scores
url https://security.gentoo.org/glsa/200705-10
107
reference_url https://access.redhat.com/errata/RHSA-2007:0125
reference_id RHSA-2007:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0125
108
reference_url https://access.redhat.com/errata/RHSA-2007:0126
reference_id RHSA-2007:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0126
109
reference_url https://access.redhat.com/errata/RHSA-2007:0132
reference_id RHSA-2007:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0132
110
reference_url https://usn.ubuntu.com/448-1/
reference_id USN-448-1
reference_type
scores
url https://usn.ubuntu.com/448-1/
Weaknesses
Exploits
Severity_range_score3.8 - 3.8
Exploitability0.5
Weighted_severity3.4
Risk_score1.7
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-rntx-ztv9-sqax