Software catalogue for xorg.freedesktop.org - page 6

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › xorg.freedesktop.org

Software catalogue for xorg.freedesktop.org - page 6

xf86-video-i128 xf86-video-i740 xf86-video-intel xf86-video-nv xf86-video-openchrome xf86-video-r128 xf86-video-rendition xf86-video-s3 xf86-video-s3virge xf86-video-savage
xf86-video-siliconmotion xf86-video-sis xf86-video-sunleo xf86-video-tdfx xf86-video-vesa xf86-video-vmware xf86-video-xgixp xf86bigfontproto xf86dgaproto xf86driproto


Showing elements 101 - 120 out of 145

  • Previous
  • 5
  • 6
  • 7
  • 8
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2023100342: Multiple vulnerabilities in libXpm Low
Patched
03.10.2023
SB2023100341: Multiple vulnerabilities in libx11 Low
Patched
03.10.2023
SB2023061549: Denial of service in libx11 Medium
Patched
15.06.2023
SB2023011734: Multiple vulnerabilities in libxpm Low
Patched Public exploit
17.01.2023
SB2021051908: Denial of service in libX11 Low
Patched
19.05.2021
SB2020082522: Privilege escalation in X.Org libX11 Low
Patched
25.08.2020
SB2020081021: Privilege escalation in libX11 library Low
Patched
10.08.2020
SB2020080522: Improper Initialization in NGINX xorg-server Low
Patched
05.08.2020
SB2018072716: Insufficient Entropy in xorg.freedesktop xcmsdb Low
Patched
27.07.2018
SB2018072717: Key management errors in xorg.freedesktop xcmsdb Low
Patched
27.07.2018

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or