Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-un9v-4svv-2baj
Vulnerability ID VCID-un9v-4svv-2baj
Aliases CVE-2023-5367
Summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
https://api.first.org/data/v1/epss?cve=CVE-2023-5367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2243091 https://bugzilla.redhat.com/show_bug.cgi?id=2243091
GLSA-202401-30 https://security.gentoo.org/glsa/202401-30
RHSA-2023:6802 https://access.redhat.com/errata/RHSA-2023:6802
RHSA-2023:6808 https://access.redhat.com/errata/RHSA-2023:6808
RHSA-2023:7373 https://access.redhat.com/errata/RHSA-2023:7373
RHSA-2023:7388 https://access.redhat.com/errata/RHSA-2023:7388
RHSA-2023:7405 https://access.redhat.com/errata/RHSA-2023:7405
RHSA-2023:7428 https://access.redhat.com/errata/RHSA-2023:7428
RHSA-2023:7436 https://access.redhat.com/errata/RHSA-2023:7436
RHSA-2023:7526 https://access.redhat.com/errata/RHSA-2023:7526
RHSA-2023:7533 https://access.redhat.com/errata/RHSA-2023:7533
RHSA-2024:0010 https://access.redhat.com/errata/RHSA-2024:0010
RHSA-2024:0128 https://access.redhat.com/errata/RHSA-2024:0128
RHSA-2024:2169 https://access.redhat.com/errata/RHSA-2024:2169
RHSA-2024:2170 https://access.redhat.com/errata/RHSA-2024:2170
RHSA-2024:2995 https://access.redhat.com/errata/RHSA-2024:2995
RHSA-2024:2996 https://access.redhat.com/errata/RHSA-2024:2996
RHSA-2025:12751 https://access.redhat.com/errata/RHSA-2025:12751
USN-6453-1 https://usn.ubuntu.com/6453-1/
USN-6453-2 https://usn.ubuntu.com/6453-2/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5367.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.20089
EPSS Score 0.00064
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:03:25.535211+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/202401-30 38.0.0