Software catalogue for xorg.freedesktop.org

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › xorg.freedesktop.org

Software catalogue for xorg.freedesktop.org

compositeproto damageproto encodings fixesproto font-adobe-100dpi font-adobe-75dpi font-adobe-utopia-100dpi font-adobe-utopia-75dpi font-adobe-utopia-type1 font-alias
font-arabic-misc font-bh-100dpi font-bh-75dpi font-bh-lucidatypewriter-100dpi font-bh-lucidatypewriter-75dpi font-bh-ttf font-bh-type1 font-bitstream-100dpi font-bitstream-75dpi font-bitstream-speedo


Showing elements 1 - 20 out of 145

  • Previous
  • 1
  • 2
  • More pages
  • 6
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2023100342: Multiple vulnerabilities in libXpm Low
Patched
03.10.2023
SB2023100341: Multiple vulnerabilities in libx11 Low
Patched
03.10.2023
SB2023061549: Denial of service in libx11 Medium
Patched
15.06.2023
SB2023011734: Multiple vulnerabilities in libxpm Low
Patched Public exploit
17.01.2023
SB2021051908: Denial of service in libX11 Low
Patched
19.05.2021
SB2020082522: Privilege escalation in X.Org libX11 Low
Patched
25.08.2020
SB2020081021: Privilege escalation in libX11 library Low
Patched
10.08.2020
SB2020080522: Improper Initialization in NGINX xorg-server Low
Patched
05.08.2020
SB2018072716: Insufficient Entropy in xorg.freedesktop xcmsdb Low
Patched
27.07.2018
SB2018072717: Key management errors in xorg.freedesktop xcmsdb Low
Patched
27.07.2018

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or