Known vulnerabilities in X.org X.org Server 1.20.10

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › X.org › X.org Server › 1.20.10

Known vulnerabilities in X.org X.org Server 1.20.10

Vendor: X.org
Website:
Total Security Bulletins: 7
21.1.19 21.1.18 21.1.17 21.1.16 21.1.15 21.1.14 21.1.13 21.1.12 21.1.11 21.1.10 21.1.9 21.1.8 21.1.7 21.1.6 21.1.5 21.1.4 21.1.3 21.1.2 21.1.1 21.1.0 21.0.99.902 21.0.99.901 1.20.14 1.20.13 21.0.99.1 1.20.12 1.20.11 1.20.10 1.20.9 1.20.8 1.20.7 1.20.6 1.20.5 1.20.4 1.19.7 1.20.3 1.20.2 1.20.1 1.20.0 1.19.99.905 1.19.99.904 1.19.99.903 1.19.99.902 1.19.99.901 1.19.6 1.19.4 1.19.3 1.91.2 1.19.1 1.19.0 1.18.99.902 1.18.99.901 1.18.99.2 1.18.4 1.18.3 1.18.2 1.18.1 1.18.0 1.17.99.901 1.17.4 1.17.3 1.17.2 1.17.1 1.17.0 1.19.5 1.12 1.8.0 1.7.0 1.5.1 1.4 1.3.0

Security bulletins (7)

Secuity bulletin Severity Status Published
SB2025061729: Multiple vulnerabilities in X.Org X server and Xwayland Low
Patched
17.06.2025
SB2023121308: Multiple vulnerabilities in X.org Server and Xwayland Low
Patched
13.12.2023
SB2023102548: Multiple vulnerabilities in X.Org X server and Xwayland Low
Patched
25.10.2023
SB2023032954: Use-after-free in X.org Server Low
Patched
29.03.2023
SB2022071303: Multiple privilege escalation vulnerabilities in X.Org Server Low
Patched
13.07.2022
SB2021121702: Multiple vulnerabilities in X.Org Server Low
Patched
17.12.2021
SB2021041370: Integer underflow in X.org Server Low
Patched
13.04.2021

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or